vuln-list-alt/oval/c9f2/ALT-PU-2021-3668/definitions.json
2024-04-16 14:26:14 +00:00

5780 lines
378 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213668",
"Version": "oval:org.altlinux.errata:def:20213668",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3668: package `MySQL` update to version 8.0.26-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3668",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3668",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-03330",
"RefURL": "https://bdu.fstec.ru/vul/2019-03330",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04013",
"RefURL": "https://bdu.fstec.ru/vul/2019-04013",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04085",
"RefURL": "https://bdu.fstec.ru/vul/2019-04085",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02114",
"RefURL": "https://bdu.fstec.ru/vul/2020-02114",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02695",
"RefURL": "https://bdu.fstec.ru/vul/2020-02695",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02873",
"RefURL": "https://bdu.fstec.ru/vul/2020-02873",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03535",
"RefURL": "https://bdu.fstec.ru/vul/2020-03535",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03592",
"RefURL": "https://bdu.fstec.ru/vul/2020-03592",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03627",
"RefURL": "https://bdu.fstec.ru/vul/2020-03627",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03642",
"RefURL": "https://bdu.fstec.ru/vul/2020-03642",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03644",
"RefURL": "https://bdu.fstec.ru/vul/2020-03644",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03687",
"RefURL": "https://bdu.fstec.ru/vul/2020-03687",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03694",
"RefURL": "https://bdu.fstec.ru/vul/2020-03694",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03696",
"RefURL": "https://bdu.fstec.ru/vul/2020-03696",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03699",
"RefURL": "https://bdu.fstec.ru/vul/2020-03699",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03707",
"RefURL": "https://bdu.fstec.ru/vul/2020-03707",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03709",
"RefURL": "https://bdu.fstec.ru/vul/2020-03709",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03761",
"RefURL": "https://bdu.fstec.ru/vul/2020-03761",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03762",
"RefURL": "https://bdu.fstec.ru/vul/2020-03762",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03763",
"RefURL": "https://bdu.fstec.ru/vul/2020-03763",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03764",
"RefURL": "https://bdu.fstec.ru/vul/2020-03764",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03765",
"RefURL": "https://bdu.fstec.ru/vul/2020-03765",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03766",
"RefURL": "https://bdu.fstec.ru/vul/2020-03766",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03767",
"RefURL": "https://bdu.fstec.ru/vul/2020-03767",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03768",
"RefURL": "https://bdu.fstec.ru/vul/2020-03768",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03769",
"RefURL": "https://bdu.fstec.ru/vul/2020-03769",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03859",
"RefURL": "https://bdu.fstec.ru/vul/2020-03859",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03869",
"RefURL": "https://bdu.fstec.ru/vul/2020-03869",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03874",
"RefURL": "https://bdu.fstec.ru/vul/2020-03874",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03880",
"RefURL": "https://bdu.fstec.ru/vul/2020-03880",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03906",
"RefURL": "https://bdu.fstec.ru/vul/2020-03906",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03929",
"RefURL": "https://bdu.fstec.ru/vul/2020-03929",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03933",
"RefURL": "https://bdu.fstec.ru/vul/2020-03933",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04263",
"RefURL": "https://bdu.fstec.ru/vul/2020-04263",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04264",
"RefURL": "https://bdu.fstec.ru/vul/2020-04264",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04271",
"RefURL": "https://bdu.fstec.ru/vul/2020-04271",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04274",
"RefURL": "https://bdu.fstec.ru/vul/2020-04274",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04277",
"RefURL": "https://bdu.fstec.ru/vul/2020-04277",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04461",
"RefURL": "https://bdu.fstec.ru/vul/2020-04461",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05020",
"RefURL": "https://bdu.fstec.ru/vul/2020-05020",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05021",
"RefURL": "https://bdu.fstec.ru/vul/2020-05021",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05046",
"RefURL": "https://bdu.fstec.ru/vul/2020-05046",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05055",
"RefURL": "https://bdu.fstec.ru/vul/2020-05055",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05056",
"RefURL": "https://bdu.fstec.ru/vul/2020-05056",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05063",
"RefURL": "https://bdu.fstec.ru/vul/2020-05063",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05064",
"RefURL": "https://bdu.fstec.ru/vul/2020-05064",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05065",
"RefURL": "https://bdu.fstec.ru/vul/2020-05065",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05066",
"RefURL": "https://bdu.fstec.ru/vul/2020-05066",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05067",
"RefURL": "https://bdu.fstec.ru/vul/2020-05067",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05068",
"RefURL": "https://bdu.fstec.ru/vul/2020-05068",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05069",
"RefURL": "https://bdu.fstec.ru/vul/2020-05069",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05070",
"RefURL": "https://bdu.fstec.ru/vul/2020-05070",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05071",
"RefURL": "https://bdu.fstec.ru/vul/2020-05071",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05072",
"RefURL": "https://bdu.fstec.ru/vul/2020-05072",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05073",
"RefURL": "https://bdu.fstec.ru/vul/2020-05073",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05074",
"RefURL": "https://bdu.fstec.ru/vul/2020-05074",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05075",
"RefURL": "https://bdu.fstec.ru/vul/2020-05075",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05076",
"RefURL": "https://bdu.fstec.ru/vul/2020-05076",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05077",
"RefURL": "https://bdu.fstec.ru/vul/2020-05077",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05078",
"RefURL": "https://bdu.fstec.ru/vul/2020-05078",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05079",
"RefURL": "https://bdu.fstec.ru/vul/2020-05079",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05080",
"RefURL": "https://bdu.fstec.ru/vul/2020-05080",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05081",
"RefURL": "https://bdu.fstec.ru/vul/2020-05081",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05082",
"RefURL": "https://bdu.fstec.ru/vul/2020-05082",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05083",
"RefURL": "https://bdu.fstec.ru/vul/2020-05083",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05084",
"RefURL": "https://bdu.fstec.ru/vul/2020-05084",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05086",
"RefURL": "https://bdu.fstec.ru/vul/2020-05086",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05087",
"RefURL": "https://bdu.fstec.ru/vul/2020-05087",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05088",
"RefURL": "https://bdu.fstec.ru/vul/2020-05088",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05089",
"RefURL": "https://bdu.fstec.ru/vul/2020-05089",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05090",
"RefURL": "https://bdu.fstec.ru/vul/2020-05090",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05388",
"RefURL": "https://bdu.fstec.ru/vul/2020-05388",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05389",
"RefURL": "https://bdu.fstec.ru/vul/2020-05389",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05390",
"RefURL": "https://bdu.fstec.ru/vul/2020-05390",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05391",
"RefURL": "https://bdu.fstec.ru/vul/2020-05391",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05392",
"RefURL": "https://bdu.fstec.ru/vul/2020-05392",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05394",
"RefURL": "https://bdu.fstec.ru/vul/2020-05394",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05395",
"RefURL": "https://bdu.fstec.ru/vul/2020-05395",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05396",
"RefURL": "https://bdu.fstec.ru/vul/2020-05396",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05397",
"RefURL": "https://bdu.fstec.ru/vul/2020-05397",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05406",
"RefURL": "https://bdu.fstec.ru/vul/2020-05406",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05407",
"RefURL": "https://bdu.fstec.ru/vul/2020-05407",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05408",
"RefURL": "https://bdu.fstec.ru/vul/2020-05408",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05410",
"RefURL": "https://bdu.fstec.ru/vul/2020-05410",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05411",
"RefURL": "https://bdu.fstec.ru/vul/2020-05411",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00328",
"RefURL": "https://bdu.fstec.ru/vul/2021-00328",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00388",
"RefURL": "https://bdu.fstec.ru/vul/2021-00388",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00404",
"RefURL": "https://bdu.fstec.ru/vul/2021-00404",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00405",
"RefURL": "https://bdu.fstec.ru/vul/2021-00405",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00412",
"RefURL": "https://bdu.fstec.ru/vul/2021-00412",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00413",
"RefURL": "https://bdu.fstec.ru/vul/2021-00413",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00418",
"RefURL": "https://bdu.fstec.ru/vul/2021-00418",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00421",
"RefURL": "https://bdu.fstec.ru/vul/2021-00421",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00443",
"RefURL": "https://bdu.fstec.ru/vul/2021-00443",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00468",
"RefURL": "https://bdu.fstec.ru/vul/2021-00468",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00469",
"RefURL": "https://bdu.fstec.ru/vul/2021-00469",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00485",
"RefURL": "https://bdu.fstec.ru/vul/2021-00485",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00486",
"RefURL": "https://bdu.fstec.ru/vul/2021-00486",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00487",
"RefURL": "https://bdu.fstec.ru/vul/2021-00487",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00510",
"RefURL": "https://bdu.fstec.ru/vul/2021-00510",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00512",
"RefURL": "https://bdu.fstec.ru/vul/2021-00512",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00513",
"RefURL": "https://bdu.fstec.ru/vul/2021-00513",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00517",
"RefURL": "https://bdu.fstec.ru/vul/2021-00517",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00518",
"RefURL": "https://bdu.fstec.ru/vul/2021-00518",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00548",
"RefURL": "https://bdu.fstec.ru/vul/2021-00548",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00572",
"RefURL": "https://bdu.fstec.ru/vul/2021-00572",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00582",
"RefURL": "https://bdu.fstec.ru/vul/2021-00582",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00583",
"RefURL": "https://bdu.fstec.ru/vul/2021-00583",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00620",
"RefURL": "https://bdu.fstec.ru/vul/2021-00620",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00621",
"RefURL": "https://bdu.fstec.ru/vul/2021-00621",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00653",
"RefURL": "https://bdu.fstec.ru/vul/2021-00653",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00662",
"RefURL": "https://bdu.fstec.ru/vul/2021-00662",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00663",
"RefURL": "https://bdu.fstec.ru/vul/2021-00663",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00664",
"RefURL": "https://bdu.fstec.ru/vul/2021-00664",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00691",
"RefURL": "https://bdu.fstec.ru/vul/2021-00691",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00693",
"RefURL": "https://bdu.fstec.ru/vul/2021-00693",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00715",
"RefURL": "https://bdu.fstec.ru/vul/2021-00715",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00758",
"RefURL": "https://bdu.fstec.ru/vul/2021-00758",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00872",
"RefURL": "https://bdu.fstec.ru/vul/2021-00872",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01844",
"RefURL": "https://bdu.fstec.ru/vul/2021-01844",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01845",
"RefURL": "https://bdu.fstec.ru/vul/2021-01845",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02453",
"RefURL": "https://bdu.fstec.ru/vul/2021-02453",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02454",
"RefURL": "https://bdu.fstec.ru/vul/2021-02454",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02455",
"RefURL": "https://bdu.fstec.ru/vul/2021-02455",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02456",
"RefURL": "https://bdu.fstec.ru/vul/2021-02456",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02457",
"RefURL": "https://bdu.fstec.ru/vul/2021-02457",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02458",
"RefURL": "https://bdu.fstec.ru/vul/2021-02458",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02459",
"RefURL": "https://bdu.fstec.ru/vul/2021-02459",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02460",
"RefURL": "https://bdu.fstec.ru/vul/2021-02460",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02461",
"RefURL": "https://bdu.fstec.ru/vul/2021-02461",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02462",
"RefURL": "https://bdu.fstec.ru/vul/2021-02462",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02463",
"RefURL": "https://bdu.fstec.ru/vul/2021-02463",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02464",
"RefURL": "https://bdu.fstec.ru/vul/2021-02464",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02465",
"RefURL": "https://bdu.fstec.ru/vul/2021-02465",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02466",
"RefURL": "https://bdu.fstec.ru/vul/2021-02466",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02467",
"RefURL": "https://bdu.fstec.ru/vul/2021-02467",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02468",
"RefURL": "https://bdu.fstec.ru/vul/2021-02468",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02469",
"RefURL": "https://bdu.fstec.ru/vul/2021-02469",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02470",
"RefURL": "https://bdu.fstec.ru/vul/2021-02470",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02471",
"RefURL": "https://bdu.fstec.ru/vul/2021-02471",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02472",
"RefURL": "https://bdu.fstec.ru/vul/2021-02472",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02473",
"RefURL": "https://bdu.fstec.ru/vul/2021-02473",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02474",
"RefURL": "https://bdu.fstec.ru/vul/2021-02474",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02475",
"RefURL": "https://bdu.fstec.ru/vul/2021-02475",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02476",
"RefURL": "https://bdu.fstec.ru/vul/2021-02476",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02477",
"RefURL": "https://bdu.fstec.ru/vul/2021-02477",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02478",
"RefURL": "https://bdu.fstec.ru/vul/2021-02478",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02479",
"RefURL": "https://bdu.fstec.ru/vul/2021-02479",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02480",
"RefURL": "https://bdu.fstec.ru/vul/2021-02480",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02481",
"RefURL": "https://bdu.fstec.ru/vul/2021-02481",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02622",
"RefURL": "https://bdu.fstec.ru/vul/2021-02622",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02623",
"RefURL": "https://bdu.fstec.ru/vul/2021-02623",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02636",
"RefURL": "https://bdu.fstec.ru/vul/2021-02636",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02637",
"RefURL": "https://bdu.fstec.ru/vul/2021-02637",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02638",
"RefURL": "https://bdu.fstec.ru/vul/2021-02638",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02639",
"RefURL": "https://bdu.fstec.ru/vul/2021-02639",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02640",
"RefURL": "https://bdu.fstec.ru/vul/2021-02640",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02641",
"RefURL": "https://bdu.fstec.ru/vul/2021-02641",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02642",
"RefURL": "https://bdu.fstec.ru/vul/2021-02642",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02643",
"RefURL": "https://bdu.fstec.ru/vul/2021-02643",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02928",
"RefURL": "https://bdu.fstec.ru/vul/2021-02928",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03580",
"RefURL": "https://bdu.fstec.ru/vul/2021-03580",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03742",
"RefURL": "https://bdu.fstec.ru/vul/2021-03742",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03744",
"RefURL": "https://bdu.fstec.ru/vul/2021-03744",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05113",
"RefURL": "https://bdu.fstec.ru/vul/2021-05113",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00375",
"RefURL": "https://bdu.fstec.ru/vul/2022-00375",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01645",
"RefURL": "https://bdu.fstec.ru/vul/2022-01645",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01648",
"RefURL": "https://bdu.fstec.ru/vul/2022-01648",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01658",
"RefURL": "https://bdu.fstec.ru/vul/2022-01658",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01751",
"RefURL": "https://bdu.fstec.ru/vul/2022-01751",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01762",
"RefURL": "https://bdu.fstec.ru/vul/2022-01762",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01819",
"RefURL": "https://bdu.fstec.ru/vul/2022-01819",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01825",
"RefURL": "https://bdu.fstec.ru/vul/2022-01825",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01826",
"RefURL": "https://bdu.fstec.ru/vul/2022-01826",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01827",
"RefURL": "https://bdu.fstec.ru/vul/2022-01827",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01828",
"RefURL": "https://bdu.fstec.ru/vul/2022-01828",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01832",
"RefURL": "https://bdu.fstec.ru/vul/2022-01832",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01851",
"RefURL": "https://bdu.fstec.ru/vul/2022-01851",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01854",
"RefURL": "https://bdu.fstec.ru/vul/2022-01854",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01855",
"RefURL": "https://bdu.fstec.ru/vul/2022-01855",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01858",
"RefURL": "https://bdu.fstec.ru/vul/2022-01858",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01864",
"RefURL": "https://bdu.fstec.ru/vul/2022-01864",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02243",
"RefURL": "https://bdu.fstec.ru/vul/2022-02243",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02244",
"RefURL": "https://bdu.fstec.ru/vul/2022-02244",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02245",
"RefURL": "https://bdu.fstec.ru/vul/2022-02245",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02246",
"RefURL": "https://bdu.fstec.ru/vul/2022-02246",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02247",
"RefURL": "https://bdu.fstec.ru/vul/2022-02247",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02248",
"RefURL": "https://bdu.fstec.ru/vul/2022-02248",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02252",
"RefURL": "https://bdu.fstec.ru/vul/2022-02252",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02253",
"RefURL": "https://bdu.fstec.ru/vul/2022-02253",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02254",
"RefURL": "https://bdu.fstec.ru/vul/2022-02254",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02255",
"RefURL": "https://bdu.fstec.ru/vul/2022-02255",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02256",
"RefURL": "https://bdu.fstec.ru/vul/2022-02256",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02257",
"RefURL": "https://bdu.fstec.ru/vul/2022-02257",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02258",
"RefURL": "https://bdu.fstec.ru/vul/2022-02258",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02259",
"RefURL": "https://bdu.fstec.ru/vul/2022-02259",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02260",
"RefURL": "https://bdu.fstec.ru/vul/2022-02260",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02261",
"RefURL": "https://bdu.fstec.ru/vul/2022-02261",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02262",
"RefURL": "https://bdu.fstec.ru/vul/2022-02262",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03437",
"RefURL": "https://bdu.fstec.ru/vul/2023-03437",
"Source": "BDU"
},
{
"RefID": "CVE-2019-14540",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17543",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17543",
"Source": "CVE"
},
{
"RefID": "CVE-2019-2897",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2897",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7317",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7317",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11080",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11655",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14539",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14539",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14540",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14540",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14547",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14547",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14550",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14550",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14553",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14553",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14559",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14559",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14568",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14568",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14575",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14575",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14576",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14576",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14586",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14586",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14591",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14591",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14597",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14597",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14614",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14619",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14619",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14620",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14620",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14623",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14623",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14624",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14624",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14631",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14631",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14632",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14632",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14633",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14633",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14634",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14634",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14641",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14641",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14643",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14651",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14651",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14654",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14654",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14663",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14663",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14672",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14672",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14678",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14678",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14680",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14680",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14697",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14697",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14702",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14702",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14725",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14765",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14765",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14769",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14769",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14771",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14771",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14773",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14773",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14775",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14775",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14776",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14776",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14777",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14785",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14785",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14786",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14789",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14790",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14790",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14791",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14791",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14793",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14793",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14794",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14794",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14799",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14799",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14800",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14800",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14804",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14804",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14809",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14812",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14814",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14821",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14821",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14827",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14827",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14828",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14828",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14829",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14829",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14830",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14836",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14836",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14837",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14837",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14838",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14838",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14839",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14839",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14844",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14844",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14845",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14845",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14846",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14846",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14848",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14848",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14852",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14852",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14860",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14860",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14861",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14861",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14866",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14866",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14867",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14867",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14868",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14868",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14869",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14870",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14870",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14873",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14873",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14878",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14888",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14888",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14891",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14891",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14893",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14893",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15358",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15358",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1967",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1971",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28196",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28196",
"Source": "CVE"
},
{
"RefID": "CVE-2020-5258",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-5258",
"Source": "CVE"
},
{
"RefID": "CVE-2020-5398",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-5398",
"Source": "CVE"
},
{
"RefID": "CVE-2021-1998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-1998",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2002",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2010",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2010",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2011",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2011",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2012",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2012",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2020",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2020",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2021",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2021",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2022",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2022",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2024",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2024",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2028",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2028",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2030",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2030",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2031",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2031",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2032",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2032",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2036",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2036",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2038",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2038",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2042",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2042",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2046",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2046",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2048",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2048",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2055",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2056",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2058",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2058",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2060",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2060",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2061",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2061",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2065",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2065",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2070",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2070",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2072",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2072",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2076",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2076",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2081",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2081",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2087",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2087",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2088",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2088",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2122",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2122",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2144",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2144",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2146",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2146",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2154",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2160",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2162",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2162",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2164",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2164",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2166",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2169",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2169",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2170",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2170",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2171",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2171",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2172",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2172",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2174",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2174",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2178",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2178",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2179",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2180",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2180",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2193",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2193",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2194",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2194",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2196",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2196",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2201",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2201",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2202",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2202",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2203",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2203",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2208",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2208",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2212",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2212",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2213",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2213",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2215",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2215",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2217",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2217",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2226",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2226",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2230",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2230",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2232",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2232",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2278",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2278",
"Source": "CVE"
},
{
"RefID": "CVE-2021-22897",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22897",
"Source": "CVE"
},
{
"RefID": "CVE-2021-22898",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22898",
"Source": "CVE"
},
{
"RefID": "CVE-2021-22901",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22901",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2293",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2293",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2298",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2298",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2299",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2299",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2300",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2300",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2301",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2301",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2304",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2304",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2305",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2305",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2307",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2307",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2308",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2308",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2339",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2339",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2340",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2340",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2342",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2342",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2352",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2352",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2354",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2354",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2356",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2356",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2357",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2357",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2367",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2367",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2370",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2370",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2372",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2372",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2374",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2374",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2383",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2383",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2384",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2384",
"Source": "CVE"
},
{
"RefID": "CVE-2021-23840",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
"Source": "CVE"
},
{
"RefID": "CVE-2021-23841",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2385",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2387",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2387",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2389",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2389",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2390",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2399",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2399",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2402",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2410",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2410",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2412",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2417",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2417",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2418",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2418",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2422",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2422",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2424",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2424",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2425",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2425",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2426",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2426",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2427",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2427",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2429",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2429",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2437",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2437",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2440",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2440",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2441",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2441",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2444",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2444",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2481",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2481",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3449",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3450",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"Source": "CVE"
},
{
"RefID": "CVE-2021-35537",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-35537",
"Source": "CVE"
},
{
"RefID": "CVE-2021-35583",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-35583",
"Source": "CVE"
},
{
"RefID": "CVE-2021-35629",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-35629",
"Source": "CVE"
}
],
"Description": "This update upgrades MySQL to version 8.0.26-alt2. \nSecurity Fix(es):\n\n * BDU:2019-03330: Уязвимость функции png_image_free (png.c) библиотеки для работы с растровой графикой в формате PNG libpng, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04013: Уязвимость подкомпонента Analytics Actions компонента Oracle Business Intelligence Enterprise Edition программной платформы Oracle Fusion Middleware, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2019-04085: Уязвимость функции FasterXML Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить полный контроль над системой\n\n * BDU:2020-02114: Уязвимость реализации инструкции ALTER TABLE системы управления базами данных SQLite, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02695: Уязвимость компонента Spring Framework программного продукта Oracle Retail Order Broker, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-02873: Уязвимость функции SSL_check_chain реализации протокола TLS библиотеки OpenSSL, связанная с с возможностью разыменования нулевого указателя в результате неправильной обработки TLS расширения «signature_algorithms_cert», позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03535: Уязвимость компонента Cluster: Packaging (dojo) системы управления базами данных Oracle MySQL Cluster, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-03592: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03627: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-03642: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03644: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-03687: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-03694: Уязвимость компонента Server: Locking системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03696: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03699: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных и вызвать отказ в обслуживании\n\n * BDU:2020-03707: Уязвимость компонента Server: Security: Roles системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных и вызвать отказ в обслуживании\n\n * BDU:2020-03709: Уязвимость компонента Server: Security: Roles системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или получить доступ на изменение, добавление или удаление данных\n\n * BDU:2020-03761: Уязвимость компонента InnoDBs системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03762: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2020-03763: Уязвимость компонента Server: Options системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03764: Уязвимость компонента Server: Security: Audit системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03765: Уязвимость компонента Server: JSON системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03766: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03767: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03768: Уязвимость компонента Server: Parser системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03769: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03859: Уязвимость компонента Server: UDF системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03869: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03874: Уязвимость компонента Audit Plug-in системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03880: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03906: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать зависание или отказ в обслуживании\n\n * BDU:2020-03929: Уязвимость компонента Server: Information Schema системы управления базами данных MySQL Server,связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03933: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04263: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04264: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04271: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04274: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04277: Уязвимость компонента Server: Pluggable Auth системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных\n\n * BDU:2020-04461: Уязвимость библиотеки nghttp2, связанная с ошибками при использовании выделенной памяти при обработке пакетов HTTP/2 SETTINGS, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05020: Уязвимость системы управления базами данных MariaDB, компонента Server: FTS СУБД MySQL, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05021: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05046: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05055: Уязвимость компонента Server: Security: LDAP Auth системы управления базами данных MySQL Server, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-05056: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-05063: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05064: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05065: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05066: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05067: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05068: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05069: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05070: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05071: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05072: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05073: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05074: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05075: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05076: Уязвимость компонента Server: Locking системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05077: Уязвимость компонента Server: FTS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05078: Уязвимость компонента Server: FTS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05079: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05080: Уязвимость компонента Server: Charsets системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05081: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05082: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05083: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05084: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05086: Уязвимость компонента Server: Security: LDAP Auth системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05087: Уязвимость компонента Server: Security: Encryption системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05088: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05089: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05090: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05388: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05389: Уязвимость компонента Server: PS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05390: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05391: Уязвимость компонента Server: X Plugin системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05392: Уязвимость компонента Server: DDL системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05394: Уязвимость компонента Server: Logging системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05395: Уязвимость компонента Server: Security: Roles системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных\n\n * BDU:2020-05396: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05397: Уязвимость компонента Server: Security: LDAP Auth системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05406: Уязвимость компонента Server: Security: Encryption системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05407: Уязвимость компонента Server: Security: LDAP Auth системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05408: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный допуск к защищаемой информации\n\n * BDU:2020-05410: Уязвимость компонента Server: PS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05411: Уязвимость компонента Server: PS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00328: Уязвимость компонента Server: DDL системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00388: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00404: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00405: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00412: Уязвимость компонента Server: Locking системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00413: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2021-00418: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00421: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00443: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00468: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00469: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00485: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00486: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00487: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00510: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю отказ в обслуживании\n\n * BDU:2021-00512: Уязвимость компонента Server: DDL системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00513: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00517: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на чтение данных или получить привилегированный доступ к инфраструктуре\n\n * BDU:2021-00518: Уязвимость компонента Server: Components Services системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00548: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00572: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00582: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегированный доступ\n\n * BDU:2021-00583: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00620: Уязвимость компонента Information Schema системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на чтение данных\n\n * BDU:2021-00621: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00653: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегированный доступ\n\n * BDU:2021-00662: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00663: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00664: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2021-00691: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00693: Уязвимость компонента Server: Replication системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00715: Уязвимость системы управления базами данных SQLite, связанная с записью данных за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00758: Уязвимость функции resetAccumulator из src/select.c системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00872: Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01844: Уязвимость реализации протокола TLS библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01845: Уязвимость реализации конфигурации X509_V_FLAG_X509_STRICT библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-02453: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02454: Уязвимость компонента Server: Replication системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02455: Уязвимость компонента Server: Parser системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-02456: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02457: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02458: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02459: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02460: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02461: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02462: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02463: Уязвимость компонента Server: Information Schema системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-02464: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02465: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02466: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02467: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02468: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02469: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02470: Уязвимость компонента Server: Stored Procedure системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2021-02471: Уязвимость компонента Server: Packaging системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных\n\n * BDU:2021-02472: Уязвимость компонента Server: Replication системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02473: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02474: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02475: Уязвимость компонента Server: Group Replication Plugin системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02476: Уязвимость компонента Server: Options системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02477: Уязвимость компонента Server: Partition системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02478: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02479: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02480: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02481: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02622: Уязвимость компонента Server: Replication системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02623: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02636: Уязвимость компонента Server: Group Replication Plugin системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02637: Уязвимость компонента Server: Information Schema системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-02638: Уязвимость компонента Server: Information Schema системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-02639: Уязвимость компонента Server: Audit Plug-in системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных\n\n * BDU:2021-02640: Уязвимость компонента Server: Stored Procedure системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02641: Уязвимость компонента Server: Stored Procedure системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02642: Уязвимость компонента Server: Stored Procedure системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02643: Уязвимость компонента Server: Partition системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02928: Уязвимость набора компонентов для построения корпоративных приложений JBoss Core Services, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03580: Уязвимость функции sscanf() библиотеки libcurl программного средства для взаимодействия с серверами CURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-03742: Уязвимость функций EVP_CipherUpdate, EVP_EncryptUpdate и EVP_DecryptUpdate инструментария для протоколов TLS и SSL OpenSSL, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03744: Уязвимость функции X509_issuer_and_serial_hash() инструментария для протоколов TLS и SSL OpenSSL, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05113: Уязвимость компонента Server: Windows системы управления базами данных MySQL Server, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00375: Уязвимость реализации протокола Transport Layer Security (TLS) библиотеки libcurl, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01645: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01648: Уязвимость компонента Server: Stored Procedure СУБД MySQL, связанная с ошибками при освобождении ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01658: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01751: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01762: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * BDU:2022-01819: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01825: Уязвимость компонента Server: DML системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01826: Уязвимость компонента Server: DML системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01827: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01828: Уязвимость компонента Server: GIS системы управления базами данных MySQL, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-01832: Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01851: Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01854: Уязвимость компонента Server: Locking системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01855: Уязвимость компонента Server: Federated системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01858: Уязвимость компонента InnoDB системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01864: Уязвимость компонента Server: DDL системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02243: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02244: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02245: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02246: Уязвимость компонента InnoDB системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02247: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02248: Уязвимость компонента Server: PS системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02252: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02253: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02254: Уязвимость компонента Server: DDL системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02255: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02256: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02257: Уязвимость компонента InnoDB системы управления базами данных MySQL, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-02258: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02259: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * BDU:2022-02260: Уязвимость компонента Server: DDL системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02261: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02262: Уязвимость компонента Server: Memcached системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03437: Уязвимость реализации сетевого протокола Kerberos операционных систем Debian GNU/Linux, Red Hat Enterprise Linux, Ubuntu, Fedora, Альт 8 СП, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-14540: A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.\n\n * CVE-2019-17543: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"\n\n * CVE-2019-2897: Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. While the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).\n\n * CVE-2019-7317: png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.\n\n * CVE-2020-11080: In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection.\n\n * CVE-2020-11655: SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.\n\n * CVE-2020-11656: In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.\n\n * CVE-2020-14539: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14540: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14547: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14550: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14553: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2020-14559: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2020-14568: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14575: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14576: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14586: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14591: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14597: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14614: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14619: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14620: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14623: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14624: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14631: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14632: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14633: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2020-14634: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2020-14641: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).\n\n * CVE-2020-14643: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2020-14651: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2020-14654: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14656: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14663: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14672: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14678: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14680: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14697: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14702: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14725: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14765: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14769: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14771: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2020-14773: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14775: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14776: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14777: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14785: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14786: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14789: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14790: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14791: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2020-14793: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14794: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14799: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14800: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14804: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14809: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14812: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14814: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14821: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14827: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n\n * CVE-2020-14828: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14829: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14830: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14836: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14837: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14838: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2020-14839: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14844: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14845: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14846: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14848: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14852: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14860: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2020-14861: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14866: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14867: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14868: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14869: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14870: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14873: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14878: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 8.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14888: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14891: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14893: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-15358: In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.\n\n * CVE-2020-1967: Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).\n\n * CVE-2020-1971: The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n\n * CVE-2020-28196: MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.\n\n * CVE-2020-5258: In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2\n\n * CVE-2020-5398: In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a \"Content-Disposition\" header in the response where the filename attribute is derived from user supplied input.\n\n * CVE-2021-1998: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).\n\n * CVE-2021-2002: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2010: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Client. CVSS 3.1 Base Score 4.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L).\n\n * CVE-2021-2011: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2012: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2020: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2021: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2022: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2024: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2028: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2030: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2031: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2032: Vulnerability in the MySQL Server product of Oracle MySQL (component: Information Schema). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2021-2036: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2038: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2042: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2021-2046: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).\n\n * CVE-2021-2048: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2021-2055: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2056: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2058: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2060: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2061: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2065: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2070: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2072: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2076: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2081: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2087: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2088: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2122: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2144: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2021-2146: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2154: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2160: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2162: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2021-2164: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2166: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2169: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2170: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2171: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2172: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2174: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2178: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2179: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2180: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2193: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2194: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2196: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2201: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2202: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2203: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2208: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2212: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2213: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2215: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2217: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2226: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).\n\n * CVE-2021-2230: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2232: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 1.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2021-2278: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-22897: curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.\n\n * CVE-2021-22898: curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.\n\n * CVE-2021-22901: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.\n\n * CVE-2021-2293: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2298: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2299: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2300: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2301: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2021-2304: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2021-2305: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2307: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N).\n\n * CVE-2021-2308: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2021-2339: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2340: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Memcached). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2021-2342: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2352: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2354: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2356: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2021-2357: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2367: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2370: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2372: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2374: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).\n\n * CVE-2021-2383: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-23840: Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n\n * CVE-2021-23841: The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n\n * CVE-2021-2384: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2385: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2021-2387: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2389: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2390: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2399: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2402: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2410: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2412: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2417: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H).\n\n * CVE-2021-2418: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2422: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2424: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2425: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2426: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2427: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2429: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2437: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2440: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2441: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2444: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2481: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n\n * CVE-2021-3450: The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n\n * CVE-2021-35537: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-35583: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Windows). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-35629: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * #40870: Unused logrotate script for MySQL router",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-12-31"
},
"Updated": {
"Date": "2021-12-31"
},
"BDUs": [
{
"ID": "BDU:2019-03330",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03330",
"Impact": "Low",
"Public": "20190126"
},
{
"ID": "BDU:2019-04013",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-04013",
"Impact": "Low",
"Public": "20191015"
},
{
"ID": "BDU:2019-04085",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-200, CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04085",
"Impact": "Critical",
"Public": "20190910"
},
{
"ID": "BDU:2020-02114",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02114",
"Impact": "Critical",
"Public": "20200409"
},
{
"ID": "BDU:2020-02695",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-79, CWE-494",
"Href": "https://bdu.fstec.ru/vul/2020-02695",
"Impact": "High",
"Public": "20200414"
},
{
"ID": "BDU:2020-02873",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02873",
"Impact": "High",
"Public": "20200421"
},
{
"ID": "BDU:2020-03535",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-74, CWE-94",
"Href": "https://bdu.fstec.ru/vul/2020-03535",
"Impact": "Low",
"Public": "20200310"
},
{
"ID": "BDU:2020-03592",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03592",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03627",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03627",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "BDU:2020-03642",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2020-03642",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03644",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03644",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "BDU:2020-03687",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03687",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "BDU:2020-03694",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03694",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03696",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03696",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03699",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03699",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03707",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03707",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03709",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03709",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03761",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-03761",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03762",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03762",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03763",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03763",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03764",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03764",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03765",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03765",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03766",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03766",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03767",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03767",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03768",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03768",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03769",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03769",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03859",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03859",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03869",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03869",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03874",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03874",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03880",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03880",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03906",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03906",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03929",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03929",
"Impact": "Low",
"Public": "20200515"
},
{
"ID": "BDU:2020-03933",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03933",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04263",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04263",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04264",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04264",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04271",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04271",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04274",
"CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04274",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04277",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04277",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04461",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-707",
"Href": "https://bdu.fstec.ru/vul/2020-04461",
"Impact": "High",
"Public": "20200603"
},
{
"ID": "BDU:2020-05020",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05020",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05021",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05021",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05046",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05046",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05055",
"CVSS": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05055",
"Impact": "High",
"Public": "20201021"
},
{
"ID": "BDU:2020-05056",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05056",
"Impact": "High",
"Public": "20201021"
},
{
"ID": "BDU:2020-05063",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05063",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05064",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05064",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05065",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05065",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05066",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05066",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05067",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05067",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05068",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05068",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05069",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05069",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05070",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05070",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05071",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05071",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05072",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05072",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05073",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05073",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05074",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05074",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05075",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05075",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05076",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05076",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05077",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05077",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05078",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05078",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05079",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05079",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05080",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05080",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05081",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05081",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05082",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05082",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05083",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05083",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05084",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05084",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05086",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05086",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05087",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05087",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05088",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05088",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05089",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05089",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05090",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05090",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05388",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05388",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05389",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05389",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05390",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05390",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05391",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05391",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05392",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05392",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05394",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05394",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05395",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05395",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05396",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05396",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05397",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05397",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05406",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05406",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05407",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05407",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05408",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05408",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05410",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05410",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05411",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05411",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2021-00328",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00328",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00388",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00388",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00404",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00404",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00405",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00405",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00412",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00412",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00413",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00413",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00418",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00418",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00421",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00421",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00443",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00443",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00468",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00468",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00469",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00469",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00485",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00485",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00486",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00486",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00487",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00487",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00510",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00510",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00512",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00512",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00513",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00513",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00517",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00517",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00518",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00518",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00548",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00548",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00572",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00572",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00582",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2021-00582",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00583",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2021-00583",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00620",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00620",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00621",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00621",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00653",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2021-00653",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00662",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00662",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00663",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00663",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00664",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00664",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00691",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00691",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00693",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00693",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00715",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-00715",
"Impact": "Low",
"Public": "20200615"
},
{
"ID": "BDU:2021-00758",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-665",
"Href": "https://bdu.fstec.ru/vul/2021-00758",
"Impact": "High",
"Public": "20200409"
},
{
"ID": "BDU:2021-00872",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-00872",
"Impact": "Low",
"Public": "20201218"
},
{
"ID": "BDU:2021-01844",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-01844",
"Impact": "Low",
"Public": "20180111"
},
{
"ID": "BDU:2021-01845",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-295",
"Href": "https://bdu.fstec.ru/vul/2021-01845",
"Impact": "High",
"Public": "20210325"
},
{
"ID": "BDU:2021-02453",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02453",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02454",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02454",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02455",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02455",
"Impact": "High",
"Public": "20210420"
},
{
"ID": "BDU:2021-02456",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02456",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02457",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02457",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02458",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02458",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02459",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02459",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02460",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02460",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02461",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02461",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02462",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02462",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02463",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02463",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02464",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02464",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02465",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02465",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02466",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02466",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02467",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02467",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02468",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02468",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02469",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02469",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02470",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02470",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02471",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02471",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02472",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02472",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02473",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02473",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02474",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02474",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02475",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02475",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02476",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02476",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02477",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02477",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02478",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02478",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02479",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02479",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02480",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02480",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02481",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02481",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02622",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02622",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02623",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02623",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02636",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02636",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02637",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02637",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02638",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02638",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02639",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02639",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02640",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02640",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02641",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02641",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02642",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02642",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02643",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02643",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-02928",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-02928",
"Impact": "High",
"Public": "20210526"
},
{
"ID": "BDU:2021-03580",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200, CWE-457, CWE-908, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2021-03580",
"Impact": "Low",
"Public": "20210427"
},
{
"ID": "BDU:2021-03742",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-03742",
"Impact": "High",
"Public": "20210216"
},
{
"ID": "BDU:2021-03744",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-03744",
"Impact": "Low",
"Public": "20210216"
},
{
"ID": "BDU:2021-05113",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-05113",
"Impact": "High",
"Public": "20211020"
},
{
"ID": "BDU:2022-00375",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-668, CWE-840",
"Href": "https://bdu.fstec.ru/vul/2022-00375",
"Impact": "Low",
"Public": "20210423"
},
{
"ID": "BDU:2022-01645",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01645",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01648",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01648",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01658",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01658",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01751",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01751",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "BDU:2022-01762",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-01762",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01819",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01819",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01825",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01825",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01826",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01826",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01827",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01827",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01828",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-01828",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01832",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01832",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01851",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01851",
"Impact": "Low",
"Public": "20210727"
},
{
"ID": "BDU:2022-01854",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01854",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01855",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01855",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-01858",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-01858",
"Impact": "Low",
"Public": "20210727"
},
{
"ID": "BDU:2022-01864",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01864",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02243",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02243",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02244",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02244",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02245",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02245",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02246",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02246",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "BDU:2022-02247",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-02247",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02248",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02248",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "BDU:2022-02252",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02252",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02253",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02253",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02254",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02254",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02255",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02255",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02256",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02256",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02257",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-02257",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02258",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02258",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02259",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-02259",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02260",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02260",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02261",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02261",
"Impact": "Low",
"Public": "20210720"
},
{
"ID": "BDU:2022-02262",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-02262",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "BDU:2023-03437",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://bdu.fstec.ru/vul/2023-03437",
"Impact": "High",
"Public": "20230626"
}
],
"CVEs": [
{
"ID": "CVE-2019-14540",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540",
"Impact": "Critical",
"Public": "20190915"
},
{
"ID": "CVE-2019-17543",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17543",
"Impact": "High",
"Public": "20191014"
},
{
"ID": "CVE-2019-2897",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2897",
"Impact": "Low",
"Public": "20191016"
},
{
"ID": "CVE-2019-7317",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7317",
"Impact": "Low",
"Public": "20190204"
},
{
"ID": "CVE-2020-11080",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-707",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080",
"Impact": "High",
"Public": "20200603"
},
{
"ID": "CVE-2020-11655",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655",
"Impact": "High",
"Public": "20200409"
},
{
"ID": "CVE-2020-11656",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656",
"Impact": "Critical",
"Public": "20200409"
},
{
"ID": "CVE-2020-14539",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14539",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14540",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14540",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14547",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14547",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14550",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14550",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14553",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14553",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14559",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14559",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14568",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14568",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14575",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14575",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14576",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14576",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14586",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14586",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14591",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14591",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14597",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14597",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14614",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14614",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14619",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14619",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14620",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14620",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14623",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14623",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14624",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14624",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14631",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14631",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14632",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14632",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14633",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14633",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14634",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14634",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14641",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14641",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14643",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14643",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14651",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14651",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14654",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14654",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14656",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14656",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14663",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14663",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "CVE-2020-14672",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14672",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14678",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14678",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "CVE-2020-14680",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14680",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14697",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14697",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "CVE-2020-14702",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14702",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14725",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14725",
"Impact": "Low",
"Public": "20200724"
},
{
"ID": "CVE-2020-14765",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14765",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14769",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14769",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14771",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14771",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14773",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14773",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14775",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14775",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14776",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14776",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14777",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14777",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14785",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14785",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14786",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14786",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14789",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14789",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14790",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14790",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14791",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14791",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14793",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14793",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14794",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14794",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14799",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14799",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14800",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14800",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14804",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14804",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14809",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14809",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14812",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14812",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14814",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14814",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14821",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14821",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14827",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14827",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14828",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14828",
"Impact": "High",
"Public": "20201021"
},
{
"ID": "CVE-2020-14829",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14829",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14830",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14830",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14836",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14836",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14837",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14837",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14838",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14838",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14839",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14839",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14844",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14844",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14845",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14845",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14846",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14846",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14848",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14848",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14852",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14852",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14860",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14860",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14861",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14861",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14866",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14866",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14867",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14867",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14868",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14868",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14869",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14869",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14870",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14870",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14873",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14873",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14878",
"CVSS": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14878",
"Impact": "High",
"Public": "20201021"
},
{
"ID": "CVE-2020-14888",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14888",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14891",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14891",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14893",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14893",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-15358",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15358",
"Impact": "Low",
"Public": "20200627"
},
{
"ID": "CVE-2020-1967",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1967",
"Impact": "High",
"Public": "20200421"
},
{
"ID": "CVE-2020-1971",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"Impact": "Low",
"Public": "20201208"
},
{
"ID": "CVE-2020-28196",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28196",
"Impact": "High",
"Public": "20201106"
},
{
"ID": "CVE-2020-5258",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-5258",
"Impact": "High",
"Public": "20200310"
},
{
"ID": "CVE-2020-5398",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-494",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-5398",
"Impact": "High",
"Public": "20200117"
},
{
"ID": "CVE-2021-1998",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-1998",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2002",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2002",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2010",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2010",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2011",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2011",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2012",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2012",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2020",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2020",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2021",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2021",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2022",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2022",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2024",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2024",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2028",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2028",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2030",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2030",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2031",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2031",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2032",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2032",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2036",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2036",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2038",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2038",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2042",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2042",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2046",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2046",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2048",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2048",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2055",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2055",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2056",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2056",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2058",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2058",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2060",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2060",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2061",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2061",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2065",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2065",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2070",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2070",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2072",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2072",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2076",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2076",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2081",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2081",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2087",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2087",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2088",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2088",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2122",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2122",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2144",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2144",
"Impact": "High",
"Public": "20210422"
},
{
"ID": "CVE-2021-2146",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2146",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2154",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2154",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2160",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2160",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2162",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2162",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2164",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2164",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2166",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2166",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2169",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2169",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2170",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2170",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2171",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2171",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2172",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2172",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2174",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2174",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2178",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2178",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2179",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2179",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2180",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2180",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2193",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2193",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2194",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2194",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2196",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2196",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2201",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2201",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2202",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2202",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2203",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2203",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2208",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2208",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2212",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2212",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2213",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2213",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2215",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2215",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2217",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2217",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2226",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2226",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2230",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2230",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2232",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2232",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2278",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2278",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-22897",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22897",
"Impact": "Low",
"Public": "20210611"
},
{
"ID": "CVE-2021-22898",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22898",
"Impact": "Low",
"Public": "20210611"
},
{
"ID": "CVE-2021-22901",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22901",
"Impact": "High",
"Public": "20210611"
},
{
"ID": "CVE-2021-2293",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2293",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2298",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2298",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2299",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2299",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2300",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2300",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2301",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2301",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2304",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2304",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2305",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2305",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2307",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2307",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2308",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2308",
"Impact": "Low",
"Public": "20210422"
},
{
"ID": "CVE-2021-2339",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2339",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2340",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2340",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2342",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2342",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2352",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2352",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2354",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2354",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2356",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2356",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2357",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2357",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2367",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2367",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2370",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2370",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2372",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2372",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2374",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2374",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2383",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2383",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2384",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2384",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-23840",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
"Impact": "High",
"Public": "20210216"
},
{
"ID": "CVE-2021-23841",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
"Impact": "Low",
"Public": "20210216"
},
{
"ID": "CVE-2021-2385",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2385",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2387",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2387",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2389",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2389",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2390",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-191",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2390",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2399",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2399",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2402",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2402",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2410",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2410",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2412",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2412",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2417",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2417",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2418",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2418",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2422",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2422",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2424",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2424",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2425",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2425",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2426",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2426",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2427",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2427",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2429",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2429",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2437",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2437",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2440",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2440",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2441",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2441",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2444",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2444",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-2481",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2481",
"Impact": "Low",
"Public": "20211020"
},
{
"ID": "CVE-2021-3449",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"Impact": "Low",
"Public": "20210325"
},
{
"ID": "CVE-2021-3450",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-295",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"Impact": "High",
"Public": "20210325"
},
{
"ID": "CVE-2021-35537",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-35537",
"Impact": "Low",
"Public": "20211020"
},
{
"ID": "CVE-2021-35583",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-35583",
"Impact": "High",
"Public": "20211020"
},
{
"ID": "CVE-2021-35629",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-35629",
"Impact": "Low",
"Public": "20211020"
}
],
"Bugzilla": [
{
"ID": "40870",
"Href": "https://bugzilla.altlinux.org/40870",
"Data": "Unused logrotate script for MySQL router"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213668001",
"Comment": "MySQL-client is earlier than 0:8.0.26-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213668002",
"Comment": "MySQL-server is earlier than 0:8.0.26-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213668003",
"Comment": "MySQL-server-perl is earlier than 0:8.0.26-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213668004",
"Comment": "libmysqlclient21 is earlier than 0:8.0.26-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213668005",
"Comment": "libmysqlclient21-devel is earlier than 0:8.0.26-alt2"
}
]
}
]
}
}
]
}