vuln-list-alt/oval/c9f2/ALT-PU-2020-1050/definitions.json
2024-12-12 21:07:30 +00:00

3231 lines
172 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201050",
"Version": "oval:org.altlinux.errata:def:20201050",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1050: package `chromium` update to version 79.0.3945.79-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1050",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1050",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02884",
"RefURL": "https://bdu.fstec.ru/vul/2019-02884",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02885",
"RefURL": "https://bdu.fstec.ru/vul/2019-02885",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03643",
"RefURL": "https://bdu.fstec.ru/vul/2019-03643",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04421",
"RefURL": "https://bdu.fstec.ru/vul/2019-04421",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04422",
"RefURL": "https://bdu.fstec.ru/vul/2019-04422",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04423",
"RefURL": "https://bdu.fstec.ru/vul/2019-04423",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04424",
"RefURL": "https://bdu.fstec.ru/vul/2019-04424",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04425",
"RefURL": "https://bdu.fstec.ru/vul/2019-04425",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04426",
"RefURL": "https://bdu.fstec.ru/vul/2019-04426",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04508",
"RefURL": "https://bdu.fstec.ru/vul/2019-04508",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00168",
"RefURL": "https://bdu.fstec.ru/vul/2020-00168",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00171",
"RefURL": "https://bdu.fstec.ru/vul/2020-00171",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01400",
"RefURL": "https://bdu.fstec.ru/vul/2020-01400",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01401",
"RefURL": "https://bdu.fstec.ru/vul/2020-01401",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01403",
"RefURL": "https://bdu.fstec.ru/vul/2020-01403",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01424",
"RefURL": "https://bdu.fstec.ru/vul/2020-01424",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01433",
"RefURL": "https://bdu.fstec.ru/vul/2020-01433",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01438",
"RefURL": "https://bdu.fstec.ru/vul/2020-01438",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01439",
"RefURL": "https://bdu.fstec.ru/vul/2020-01439",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01440",
"RefURL": "https://bdu.fstec.ru/vul/2020-01440",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01441",
"RefURL": "https://bdu.fstec.ru/vul/2020-01441",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01465",
"RefURL": "https://bdu.fstec.ru/vul/2020-01465",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01466",
"RefURL": "https://bdu.fstec.ru/vul/2020-01466",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01467",
"RefURL": "https://bdu.fstec.ru/vul/2020-01467",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01505",
"RefURL": "https://bdu.fstec.ru/vul/2020-01505",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01604",
"RefURL": "https://bdu.fstec.ru/vul/2020-01604",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01605",
"RefURL": "https://bdu.fstec.ru/vul/2020-01605",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01606",
"RefURL": "https://bdu.fstec.ru/vul/2020-01606",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01607",
"RefURL": "https://bdu.fstec.ru/vul/2020-01607",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01608",
"RefURL": "https://bdu.fstec.ru/vul/2020-01608",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01609",
"RefURL": "https://bdu.fstec.ru/vul/2020-01609",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01610",
"RefURL": "https://bdu.fstec.ru/vul/2020-01610",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01611",
"RefURL": "https://bdu.fstec.ru/vul/2020-01611",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01612",
"RefURL": "https://bdu.fstec.ru/vul/2020-01612",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01613",
"RefURL": "https://bdu.fstec.ru/vul/2020-01613",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01614",
"RefURL": "https://bdu.fstec.ru/vul/2020-01614",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01615",
"RefURL": "https://bdu.fstec.ru/vul/2020-01615",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01616",
"RefURL": "https://bdu.fstec.ru/vul/2020-01616",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01617",
"RefURL": "https://bdu.fstec.ru/vul/2020-01617",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01618",
"RefURL": "https://bdu.fstec.ru/vul/2020-01618",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01619",
"RefURL": "https://bdu.fstec.ru/vul/2020-01619",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01620",
"RefURL": "https://bdu.fstec.ru/vul/2020-01620",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01621",
"RefURL": "https://bdu.fstec.ru/vul/2020-01621",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01622",
"RefURL": "https://bdu.fstec.ru/vul/2020-01622",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01623",
"RefURL": "https://bdu.fstec.ru/vul/2020-01623",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01624",
"RefURL": "https://bdu.fstec.ru/vul/2020-01624",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01625",
"RefURL": "https://bdu.fstec.ru/vul/2020-01625",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01626",
"RefURL": "https://bdu.fstec.ru/vul/2020-01626",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01627",
"RefURL": "https://bdu.fstec.ru/vul/2020-01627",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01628",
"RefURL": "https://bdu.fstec.ru/vul/2020-01628",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01629",
"RefURL": "https://bdu.fstec.ru/vul/2020-01629",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01630",
"RefURL": "https://bdu.fstec.ru/vul/2020-01630",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01631",
"RefURL": "https://bdu.fstec.ru/vul/2020-01631",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01634",
"RefURL": "https://bdu.fstec.ru/vul/2020-01634",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01635",
"RefURL": "https://bdu.fstec.ru/vul/2020-01635",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01636",
"RefURL": "https://bdu.fstec.ru/vul/2020-01636",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01637",
"RefURL": "https://bdu.fstec.ru/vul/2020-01637",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01638",
"RefURL": "https://bdu.fstec.ru/vul/2020-01638",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01639",
"RefURL": "https://bdu.fstec.ru/vul/2020-01639",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01644",
"RefURL": "https://bdu.fstec.ru/vul/2020-01644",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01646",
"RefURL": "https://bdu.fstec.ru/vul/2020-01646",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01671",
"RefURL": "https://bdu.fstec.ru/vul/2020-01671",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01672",
"RefURL": "https://bdu.fstec.ru/vul/2020-01672",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01673",
"RefURL": "https://bdu.fstec.ru/vul/2020-01673",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01674",
"RefURL": "https://bdu.fstec.ru/vul/2020-01674",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01684",
"RefURL": "https://bdu.fstec.ru/vul/2020-01684",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01693",
"RefURL": "https://bdu.fstec.ru/vul/2020-01693",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01694",
"RefURL": "https://bdu.fstec.ru/vul/2020-01694",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01695",
"RefURL": "https://bdu.fstec.ru/vul/2020-01695",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01696",
"RefURL": "https://bdu.fstec.ru/vul/2020-01696",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01697",
"RefURL": "https://bdu.fstec.ru/vul/2020-01697",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01698",
"RefURL": "https://bdu.fstec.ru/vul/2020-01698",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01699",
"RefURL": "https://bdu.fstec.ru/vul/2020-01699",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01700",
"RefURL": "https://bdu.fstec.ru/vul/2020-01700",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01701",
"RefURL": "https://bdu.fstec.ru/vul/2020-01701",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01702",
"RefURL": "https://bdu.fstec.ru/vul/2020-01702",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01703",
"RefURL": "https://bdu.fstec.ru/vul/2020-01703",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01704",
"RefURL": "https://bdu.fstec.ru/vul/2020-01704",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01705",
"RefURL": "https://bdu.fstec.ru/vul/2020-01705",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01706",
"RefURL": "https://bdu.fstec.ru/vul/2020-01706",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01724",
"RefURL": "https://bdu.fstec.ru/vul/2020-01724",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01725",
"RefURL": "https://bdu.fstec.ru/vul/2020-01725",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01750",
"RefURL": "https://bdu.fstec.ru/vul/2020-01750",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01751",
"RefURL": "https://bdu.fstec.ru/vul/2020-01751",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01754",
"RefURL": "https://bdu.fstec.ru/vul/2020-01754",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01755",
"RefURL": "https://bdu.fstec.ru/vul/2020-01755",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01758",
"RefURL": "https://bdu.fstec.ru/vul/2020-01758",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01760",
"RefURL": "https://bdu.fstec.ru/vul/2020-01760",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01761",
"RefURL": "https://bdu.fstec.ru/vul/2020-01761",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01764",
"RefURL": "https://bdu.fstec.ru/vul/2020-01764",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01766",
"RefURL": "https://bdu.fstec.ru/vul/2020-01766",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01770",
"RefURL": "https://bdu.fstec.ru/vul/2020-01770",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01779",
"RefURL": "https://bdu.fstec.ru/vul/2020-01779",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01780",
"RefURL": "https://bdu.fstec.ru/vul/2020-01780",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01781",
"RefURL": "https://bdu.fstec.ru/vul/2020-01781",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01782",
"RefURL": "https://bdu.fstec.ru/vul/2020-01782",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01783",
"RefURL": "https://bdu.fstec.ru/vul/2020-01783",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01784",
"RefURL": "https://bdu.fstec.ru/vul/2020-01784",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01785",
"RefURL": "https://bdu.fstec.ru/vul/2020-01785",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01786",
"RefURL": "https://bdu.fstec.ru/vul/2020-01786",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01787",
"RefURL": "https://bdu.fstec.ru/vul/2020-01787",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01788",
"RefURL": "https://bdu.fstec.ru/vul/2020-01788",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01789",
"RefURL": "https://bdu.fstec.ru/vul/2020-01789",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01790",
"RefURL": "https://bdu.fstec.ru/vul/2020-01790",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01791",
"RefURL": "https://bdu.fstec.ru/vul/2020-01791",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01792",
"RefURL": "https://bdu.fstec.ru/vul/2020-01792",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01793",
"RefURL": "https://bdu.fstec.ru/vul/2020-01793",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01798",
"RefURL": "https://bdu.fstec.ru/vul/2020-01798",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01799",
"RefURL": "https://bdu.fstec.ru/vul/2020-01799",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01800",
"RefURL": "https://bdu.fstec.ru/vul/2020-01800",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01802",
"RefURL": "https://bdu.fstec.ru/vul/2020-01802",
"Source": "BDU"
},
{
"RefID": "CVE-2019-13659",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13659",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13660",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13661",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13661",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13662",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13662",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13663",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13663",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13664",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13664",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13665",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13665",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13666",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13667",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13667",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13668",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13668",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13669",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13670",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13670",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13671",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13671",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13673",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13673",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13674",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13674",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13675",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13675",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13676",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13676",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13677",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13677",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13678",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13678",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13679",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13679",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13680",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13680",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13681",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13681",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13682",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13682",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13683",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13683",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13685",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13685",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13686",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13686",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13687",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13687",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13688",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13691",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13691",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13692",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13692",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13693",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13693",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13694",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13694",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13695",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13695",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13696",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13696",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13697",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13697",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13699",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13700",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13701",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13702",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13703",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13704",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13706",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13707",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13708",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13709",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13711",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13713",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13714",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13715",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13716",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13717",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13718",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13719",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13720",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13720",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13721",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13721",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13723",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13724",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13724",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13727",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13741",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13742",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13745",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13747",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13748",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13749",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13750",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13751",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13752",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13753",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13755",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13758",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13759",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13761",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13762",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13763",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13764",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13765",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13765",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13766",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13766",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15903",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5867",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5867",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5868",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5868",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5869",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5870",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5870",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5871",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5871",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5872",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5872",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5873",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5873",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5874",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5875",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5875",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5876",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5876",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5877",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5877",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5878",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5879",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5880",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5880",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5881",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5881",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 79.0.3945.79-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02884: Уязвимость компонента ExecuteFieldAction обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02885: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03643: Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04421: Уязвимость расширения Color Enhancer браузера Google Chrome, позволяющая нарушителю изменить данные HTML-страницы\n\n * BDU:2019-04422: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04423: Уязвимость браузера Google Chrome, связанная с неправильной авторизацией, позволяющая нарушителю обойти ограничения навигации\n\n * BDU:2019-04424: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности\n\n * BDU:2019-04425: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04426: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности\n\n * BDU:2019-04508: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-00168: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2020-00171: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2020-01400: Уязвимость дебаггера Skia браузера Google Chrome, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01401: Уязвимость службы Bluetooth браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01403: Уязвимость службы Bluetooth браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01424: Уязвимость механизма ввода данных в Blink браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01433: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01438: Уязвимость механизма обработки внешних протоколов браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01439: Уязвимость механизма обработки файлов cookie браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01440: Уязвимость механизма обработки аудио файлове браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01441: Уязвимость механизма в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01465: Уязвимость механизма рендеринга в Android браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01466: Уязвимость инструментов разработки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01467: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01505: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01604: Уязвимость реализации протокола WebRTC браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01605: Уязвимость встроенной базы данных IndexedDB браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01606: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01607: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01608: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01609: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01610: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01611: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01612: Уязвимость реализации протокола TLS браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01613: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01614: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01615: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01616: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01617: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01618: Уязвимость адресной строки Omnibox инструментов разработчика браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01619: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01620: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01621: Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01622: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01623: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01624: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01625: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01626: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01627: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01628: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01629: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01630: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01631: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01634: Уязвимость механизма навигации в Android браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01635: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01636: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01637: Уязвимость политики безопасности расширений браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01638: Уязвимость политики безопасности расширений браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01639: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01644: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01646: Уязвимость механизма инициализации данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01671: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01672: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01673: Уязвимость инструментов разработчика браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ\n\n * BDU:2020-01674: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01684: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01693: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01694: Уязвимость браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01695: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01696: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01697: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01698: Уязвимость браузера Google Chrome, связанная с доступом к ресурсу с использованием несовместимого типа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01699: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01700: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01701: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01702: Уязвимость браузера Google Chrome, связанная с целочисленным переполнением, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01703: Уязвимость браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-01704: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01705: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01706: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01724: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01725: Уязвимость системы высокопроизводительного рендеринга SwiftShader браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-01750: Уязвимость браузера Google Chrome, связанная с выходом операции за границы памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01751: Уязвимость браузера Google Chrome, связанная с неправильным применением политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01754: Уязвимость библиотеки передачи сообщений Mojo браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01755: Уязвимость расширений браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01758: Уязвимость браузера Google Chrome, связанная с неправильной настройкой политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01760: Уязвимость браузера Google Chrome, связанная с недостаточной фильтрацией в URL строке, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01761: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01764: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01766: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01770: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01779: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01780: Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01781: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ\n\n * BDU:2020-01782: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01783: Уязвимость браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01784: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01785: Уязвимость установщика браузера Google Chrome, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01786: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01787: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01788: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01789: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01790: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01791: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01792: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01793: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01798: Уязвимость пользовательского интерфейса в интерстициалах браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01799: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01800: Уязвимость механизма загрузки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01802: Уязвимость функции типизации в JavaScript браузера Google Chrome позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * CVE-2019-13659: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13660: UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.\n\n * CVE-2019-13661: UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.\n\n * CVE-2019-13662: Insufficient policy enforcement in navigations in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13663: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13664: Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13665: Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.\n\n * CVE-2019-13666: Information leak in storage in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13667: Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13668: Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13669: Incorrect data validation in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13670: Insufficient data validation in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13671: UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13673: Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13674: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13675: Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13676: Insufficient policy enforcement in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13677: Insufficient policy enforcement in site isolation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13678: Incorrect data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13679: Insufficient policy enforcement in PDFium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to show print dialogs via a crafted PDF file.\n\n * CVE-2019-13680: Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections.\n\n * CVE-2019-13681: Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13682: Insufficient policy enforcement in external protocol handling in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13683: Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13685: Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13686: Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13687: Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13688: Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13691: Insufficient validation of untrusted input in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13692: Insufficient policy enforcement in reader mode in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13693: Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13694: Use after free in WebRTC in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13695: Use after free in audio in Google Chrome on Android prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13696: Use after free in JavaScript in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13697: Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13699: Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13700: Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13701: Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13702: Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.\n\n * CVE-2019-13703: Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13704: Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13705: Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.\n\n * CVE-2019-13706: Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13707: Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.\n\n * CVE-2019-13708: Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13709: Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13710: Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13711: Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13713: Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13714: Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.\n\n * CVE-2019-13715: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13716: Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13717: Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.\n\n * CVE-2019-13718: Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13719: Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.\n\n * CVE-2019-13720: Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13721: Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13723: Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13724: Out of bounds memory access in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13725: Use-after-free in Bluetooth in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13726: Buffer overflow in password manager in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13727: Insufficient policy enforcement in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13728: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13729: Use-after-free in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13730: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13732: Use-after-free in WebAudio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13734: Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13735: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-13736: Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13737: Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13738: Insufficient policy enforcement in navigation in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13739: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13740: Incorrect security UI in sharing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13741: Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.\n\n * CVE-2019-13742: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-13743: Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13744: Insufficient policy enforcement in cookies in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13745: Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13746: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13747: Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13748: Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13749: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13750: Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.\n\n * CVE-2019-13751: Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13752: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13753: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13754: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13755: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13756: Incorrect security UI in printing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13757: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13758: Insufficient policy enforcement in navigation in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13759: Incorrect security UI in interstitials in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13761: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13762: Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.\n\n * CVE-2019-13763: Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13764: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13765: Use-after-free in content delivery manager in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13766: Use-after-free in accessibility in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-15903: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.\n\n * CVE-2019-5867: Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5868: Use after free in PDFium in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-5869: Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5870: Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2019-5871: Heap buffer overflow in Skia in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5872: Use after free in Mojo in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5873: Insufficient policy validation in navigation in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-5874: Insufficient filtering in URI schemes in Google Chrome on Windows prior to 77.0.3865.75 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-5875: Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-5876: Use after free in media in Google Chrome on Android prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5877: Out of bounds memory access in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5878: Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5879: Insufficient policy enforcement in extensions in Google Chrome prior to 77.0.3865.75 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.\n\n * CVE-2019-5880: Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-5881: Out of bounds read in SwiftShader in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-01-15"
},
"Updated": {
"Date": "2020-01-15"
},
"BDUs": [
{
"ID": "BDU:2019-02884",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-02884",
"Impact": "High",
"Public": "20190806"
},
{
"ID": "BDU:2019-02885",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-02885",
"Impact": "High",
"Public": "20190806"
},
{
"ID": "BDU:2019-03643",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-611",
"Href": "https://bdu.fstec.ru/vul/2019-03643",
"Impact": "High",
"Public": "20190828"
},
{
"ID": "BDU:2019-04421",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-74",
"Href": "https://bdu.fstec.ru/vul/2019-04421",
"Impact": "Low",
"Public": "20190710"
},
{
"ID": "BDU:2019-04422",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2019-04422",
"Impact": "Low",
"Public": "20170831"
},
{
"ID": "BDU:2019-04423",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://bdu.fstec.ru/vul/2019-04423",
"Impact": "Low",
"Public": "20190919"
},
{
"ID": "BDU:2019-04424",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://bdu.fstec.ru/vul/2019-04424",
"Impact": "Low",
"Public": "20180503"
},
{
"ID": "BDU:2019-04425",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04425",
"Impact": "Low",
"Public": "20180720"
},
{
"ID": "BDU:2019-04426",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://bdu.fstec.ru/vul/2019-04426",
"Impact": "Low",
"Public": "20190131"
},
{
"ID": "BDU:2019-04508",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04508",
"Impact": "High",
"Public": "20191031"
},
{
"ID": "BDU:2020-00168",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00168",
"Impact": "High",
"Public": "20191012"
},
{
"ID": "BDU:2020-00171",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00171",
"Impact": "Low",
"Public": "20190626"
},
{
"ID": "BDU:2020-01400",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01400",
"Impact": "High",
"Public": "20190621"
},
{
"ID": "BDU:2020-01401",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01401",
"Impact": "High",
"Public": "20191110"
},
{
"ID": "BDU:2020-01403",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01403",
"Impact": "High",
"Public": "20191110"
},
{
"ID": "BDU:2020-01424",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01424",
"Impact": "High",
"Public": "20200108"
},
{
"ID": "BDU:2020-01433",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01433",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01438",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01438",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01439",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01439",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01440",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01440",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01441",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01441",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01465",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01465",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "BDU:2020-01466",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01466",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01467",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01467",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01505",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01505",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01604",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01604",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01605",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01605",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01606",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01606",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01607",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01607",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01608",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01608",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01609",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01609",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01610",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01610",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01611",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01611",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01612",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-01612",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01613",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01613",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01614",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01614",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01615",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01615",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01616",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01616",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01617",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01617",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01618",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01618",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01619",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01619",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01620",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01620",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01621",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01621",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01622",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01622",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01623",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01623",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01624",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01624",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01625",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01625",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01626",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01626",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01627",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01627",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01628",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01628",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01629",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01629",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01630",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01630",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01631",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01631",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01634",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01634",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01635",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01635",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01636",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01636",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01637",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01637",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01638",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01638",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01639",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01639",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01644",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01644",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01646",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01646",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01671",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01671",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01672",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01672",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01673",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01673",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01674",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01674",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01684",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01684",
"Impact": "Critical",
"Public": "20190621"
},
{
"ID": "BDU:2020-01693",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01693",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01694",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01694",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01695",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01695",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01696",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01696",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01697",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01697",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01698",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01698",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01699",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01699",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01700",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01700",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01701",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01701",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01702",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-01702",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01703",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01703",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01704",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01704",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01705",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01705",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01706",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01706",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01724",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01724",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01725",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01725",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01750",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01750",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01751",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01751",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01754",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01754",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01755",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01755",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01758",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01758",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01760",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01760",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01761",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01761",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01764",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01764",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01766",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01766",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01770",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01770",
"Impact": "Low",
"Public": "20190621"
},
{
"ID": "BDU:2020-01779",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01779",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01780",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01780",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01781",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01781",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01782",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01782",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01783",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01783",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01784",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01784",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01785",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-01785",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01786",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01786",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01787",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01787",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01788",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01788",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01789",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01789",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01790",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01790",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01791",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01791",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01792",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01792",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01793",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01793",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01798",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01798",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01799",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01799",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01800",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01800",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01802",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01802",
"Impact": "High",
"Public": "20191210"
}
],
"CVEs": [
{
"ID": "CVE-2019-13659",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13659",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13660",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13660",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13661",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13661",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13662",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13662",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13663",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13663",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13664",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13664",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13665",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13665",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13666",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13666",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13667",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13667",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13668",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13668",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13669",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13669",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13670",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13670",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13671",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13671",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13673",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13673",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13674",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13674",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13675",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13675",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13676",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13676",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13677",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13677",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13678",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13678",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13679",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13679",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13680",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13680",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13681",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13681",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13682",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13682",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13683",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13683",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13685",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13685",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13686",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13686",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13687",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13687",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13688",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13691",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13691",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13692",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13692",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13693",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13693",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13694",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13694",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13695",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13695",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13696",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13696",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13697",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-209",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13697",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13699",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13700",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13701",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13702",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13703",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13704",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13705",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13706",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13707",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13708",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13709",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13710",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13711",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13713",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13714",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13715",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13716",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13717",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13718",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13719",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13720",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13720",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13721",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13721",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13723",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13723",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13724",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13724",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13725",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13726",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13727",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13728",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13729",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13730",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13732",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13734",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13735",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13736",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13737",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13738",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13739",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13740",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13741",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13742",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13743",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13744",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13745",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13746",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13747",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13748",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13749",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13750",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13751",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13753",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13754",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13755",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13756",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13757",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13758",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13759",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13761",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13762",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13763",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13764",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13765",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13765",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "CVE-2019-13766",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13766",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "CVE-2019-15903",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"Impact": "High",
"Public": "20190904"
},
{
"ID": "CVE-2019-5867",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5867",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5868",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5868",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5869",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5869",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5870",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5870",
"Impact": "Critical",
"Public": "20191125"
},
{
"ID": "CVE-2019-5871",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5871",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5872",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5872",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5873",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5873",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5874",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5874",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5875",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5875",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5876",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5876",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5877",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5877",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5878",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5878",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5879",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5879",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5880",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5880",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5881",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5881",
"Impact": "High",
"Public": "20191125"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201050001",
"Comment": "chromium is earlier than 0:79.0.3945.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201050002",
"Comment": "chromium-gnome is earlier than 0:79.0.3945.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201050003",
"Comment": "chromium-kde is earlier than 0:79.0.3945.79-alt1"
}
]
}
]
}
}
]
}