1291 lines
71 KiB
JSON
1291 lines
71 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20211792",
|
||
"Version": "oval:org.altlinux.errata:def:20211792",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-1792: package `jackson-databind` update to version 2.10.2-alt1_2jpp8",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-1792",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1792",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04081",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04081",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04085",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04085",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04776",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04776",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04777",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04777",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04778",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04778",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00566",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00566",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00688",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00688",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02242",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02242",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03616",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03616",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03617",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03617",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03618",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03618",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04358",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04358",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04467",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04467",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04468",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04468",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04507",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04507",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04626",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04626",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04627",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04627",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04628",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04628",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04944",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04944",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00714",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00714",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00725",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00725",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00763",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00763",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00767",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00767",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00768",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00768",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00771",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00771",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00772",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00772",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00840",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00840",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00882",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00882",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01045",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01045",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01572",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01572",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02829",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02829",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02830",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02830",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02831",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02831",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02832",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02832",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02833",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02833",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02834",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02834",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02835",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02835",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02836",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02836",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02837",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02837",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02838",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02838",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02839",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02839",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02953",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02953",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03804",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03804",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14540",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14892",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14893",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16335",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16942",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16943",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-17267",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-17531",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-20330",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10650",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10650",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10672",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10673",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10968",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10969",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-11111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-11112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-11113",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-11619",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-11620",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-14060",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-14061",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-14062",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-14195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24616",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24616",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24750",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35490",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35491",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35728",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36179",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36180",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36181",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36182",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36183",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36184",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36185",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36186",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36187",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36188",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36189",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-8840",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-9546",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-9547",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-9548",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20190",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades jackson-databind to version 2.10.2-alt1_2jpp8. \nSecurity Fix(es):\n\n * BDU:2019-04081: Уязвимость функции FasterXML (com.zaxxer.hikari.HikariDataSource) Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить полный контроль над системой\n\n * BDU:2019-04085: Уязвимость функции FasterXML Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить полный контроль над системой\n\n * BDU:2019-04776: Уязвимость компонентов SharedPoolDataSource и PerUserPoolDataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2019-04777: Уязвимость компонента P6DataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2019-04778: Уязвимость реализации механизма полиморфной типизации данных библиотеки jackson-databind, позволяющая нарушителю выполнить вредоносную нагрузку\n\n * BDU:2020-00566: Уязвимость реализации механизма полиморфной типизации данных библиотеки FasterXML Jackson-databind, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-00688: Уязвимость функции FasterXML Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить полный контроль над системой\n\n * BDU:2020-02242: Уязвимость библиотеки Jackson-databind, связанная с восстановлением недостоверных данных в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2020-03616: Уязвимость компонента br.com.anteros.dbcp.AnterosDBCPConfig Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03617: Уязвимость компонента com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03618: Уязвимость компонента org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04358: Уязвимость компонента br.com.anteros.dbcp.AnterosDBCPDataSource библиотеки FasterXML jackson-databind, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-04467: Уязвимость компонента commons-jelly библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04468: Уязвимость компонента spring-aop библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04507: Уязвимость библиотеки Jackson-databind проекта FasterXML, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04626: Уязвимость компонента com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04627: Уязвимость компонента oadd.org.apache.xalan.lib.sql.JNDIConnectionPool библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04628: Уязвимость компонента weblogic/oracle-aqjms библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04944: Уязвимость компонента org.jsecurity библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00714: Уязвимость компонента org.aoju.bus.proxy.provider.remoting.RmiProvider библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00725: Уязвимость компонента org.aoju.bus.proxy.provider.remoting.RmiProvider библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00763: Уязвимость компонента org.apache.activemq библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00767: Уязвимость класса ignite-jta библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00768: Уязвимость компонента org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00771: Уязвимость библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00772: Уязвимость компонента org.apache.openjpa.ee.WASRegistryManagedRuntime библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00840: Уязвимость компонента org.apache.commons.proxy.provider.remoting.RmiProvider библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00882: Уязвимость функции в com.pastdev.httpcomponents.configuration.JndiConfiguration библиотеки Jackson-databind проекта FasterXML , позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-01045: Уязвимость библиотеки Jackson-databind проекта FasterXML, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-01572: Уязвимость компонента xbean-reflect/JNDI библиотеки Jackson-databind, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-02829: Уязвимость компонента org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02830: Уязвимость компонента oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02831: Уязвимость компонента org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02832: Уязвимость компонента org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02833: Уязвимость компонента org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02834: Уязвимость компонента com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02835: Уязвимость компонента com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02836: Уязвимость компонента org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02837: Уязвимость компонента org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02838: Уязвимость компонента org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02839: Уязвимость компонента org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02953: Уязвимость библиотеки Jackson-databind проекта FasterXML, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03804: Уязвимость компонента org.apache.commons.dbcp2.datasources.PerUserPoolDataSource библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2019-14540: A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.\n\n * CVE-2019-14892: A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.\n\n * CVE-2019-14893: A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.\n\n * CVE-2019-16335: A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.\n\n * CVE-2019-16942: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.\n\n * CVE-2019-16943: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.\n\n * CVE-2019-17267: A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.\n\n * CVE-2019-17531: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.\n\n * CVE-2019-20330: FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.\n\n * CVE-2020-10650: A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.\n\n * CVE-2020-10672: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).\n\n * CVE-2020-10673: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).\n\n * CVE-2020-10968: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).\n\n * CVE-2020-10969: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.\n\n * CVE-2020-11111: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).\n\n * CVE-2020-11112: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).\n\n * CVE-2020-11113: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).\n\n * CVE-2020-11619: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).\n\n * CVE-2020-11620: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).\n\n * CVE-2020-14060: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).\n\n * CVE-2020-14061: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).\n\n * CVE-2020-14062: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).\n\n * CVE-2020-14195: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).\n\n * CVE-2020-24616: FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).\n\n * CVE-2020-24750: FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.\n\n * CVE-2020-35490: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.\n\n * CVE-2020-35491: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.\n\n * CVE-2020-35728: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).\n\n * CVE-2020-36179: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.\n\n * CVE-2020-36180: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.\n\n * CVE-2020-36181: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.\n\n * CVE-2020-36182: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.\n\n * CVE-2020-36183: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.\n\n * CVE-2020-36184: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.\n\n * CVE-2020-36185: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.\n\n * CVE-2020-36186: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.\n\n * CVE-2020-36187: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.\n\n * CVE-2020-36188: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.\n\n * CVE-2020-36189: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.\n\n * CVE-2020-8840: FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.\n\n * CVE-2020-9546: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).\n\n * CVE-2020-9547: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).\n\n * CVE-2020-9548: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).\n\n * CVE-2021-20190: A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-05-13"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-05-13"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-04081",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-200, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04081",
|
||
"Impact": "Critical",
|
||
"Public": "20190910"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04085",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-200, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04085",
|
||
"Impact": "Critical",
|
||
"Public": "20190910"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04776",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04776",
|
||
"Impact": "Critical",
|
||
"Public": "20190927"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04777",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04777",
|
||
"Impact": "Critical",
|
||
"Public": "20190927"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04778",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-200, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04778",
|
||
"Impact": "Critical",
|
||
"Public": "20190927"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00566",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-200, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00566",
|
||
"Impact": "Critical",
|
||
"Public": "20190806"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00688",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00688",
|
||
"Impact": "Critical",
|
||
"Public": "20191012"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02242",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02242",
|
||
"Impact": "Critical",
|
||
"Public": "20191019"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03616",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03616",
|
||
"Impact": "Critical",
|
||
"Public": "20200301"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03617",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03617",
|
||
"Impact": "Critical",
|
||
"Public": "20200301"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03618",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03618",
|
||
"Impact": "Critical",
|
||
"Public": "20200301"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04358",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-94",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04358",
|
||
"Impact": "High",
|
||
"Public": "20200825"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04467",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04467",
|
||
"Impact": "Critical",
|
||
"Public": "20200407"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04468",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04468",
|
||
"Impact": "Critical",
|
||
"Public": "20200702"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04507",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-200, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04507",
|
||
"Impact": "Critical",
|
||
"Public": "20200302"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04626",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04626",
|
||
"Impact": "High",
|
||
"Public": "20200718"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04627",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04627",
|
||
"Impact": "High",
|
||
"Public": "20200718"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04628",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04628",
|
||
"Impact": "High",
|
||
"Public": "20200718"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04944",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04944",
|
||
"Impact": "High",
|
||
"Public": "20200616"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00714",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00714",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00725",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00725",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00763",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00763",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00767",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00767",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00768",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00768",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00771",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00771",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00772",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00772",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00840",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00840",
|
||
"Impact": "High",
|
||
"Public": "20200131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-00882",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00882",
|
||
"Impact": "High",
|
||
"Public": "20200917"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01045",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01045",
|
||
"Impact": "High",
|
||
"Public": "20201227"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01572",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01572",
|
||
"Impact": "High",
|
||
"Public": "20200210"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02829",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02829",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02830",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02830",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02831",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02831",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02832",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02832",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02833",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02833",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02834",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02834",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02835",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02835",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02836",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02836",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02837",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02837",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02838",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02838",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02839",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02839",
|
||
"Impact": "High",
|
||
"Public": "20210101"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02953",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-200, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02953",
|
||
"Impact": "Critical",
|
||
"Public": "20190919"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03804",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03804",
|
||
"Impact": "High",
|
||
"Public": "20201217"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-14540",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540",
|
||
"Impact": "Critical",
|
||
"Public": "20190915"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-14892",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892",
|
||
"Impact": "Critical",
|
||
"Public": "20200302"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-14893",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893",
|
||
"Impact": "Critical",
|
||
"Public": "20200302"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16335",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335",
|
||
"Impact": "Critical",
|
||
"Public": "20190915"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16942",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942",
|
||
"Impact": "Critical",
|
||
"Public": "20191001"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16943",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943",
|
||
"Impact": "Critical",
|
||
"Public": "20191001"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-17267",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267",
|
||
"Impact": "Critical",
|
||
"Public": "20191007"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-17531",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531",
|
||
"Impact": "Critical",
|
||
"Public": "20191012"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-20330",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330",
|
||
"Impact": "Critical",
|
||
"Public": "20200103"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10650",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10650",
|
||
"Impact": "High",
|
||
"Public": "20221226"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10672",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672",
|
||
"Impact": "High",
|
||
"Public": "20200318"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10673",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673",
|
||
"Impact": "High",
|
||
"Public": "20200318"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10968",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968",
|
||
"Impact": "High",
|
||
"Public": "20200326"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10969",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969",
|
||
"Impact": "High",
|
||
"Public": "20200326"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-11111",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111",
|
||
"Impact": "High",
|
||
"Public": "20200331"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-11112",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112",
|
||
"Impact": "High",
|
||
"Public": "20200331"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-11113",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113",
|
||
"Impact": "High",
|
||
"Public": "20200331"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-11619",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619",
|
||
"Impact": "High",
|
||
"Public": "20200407"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-11620",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620",
|
||
"Impact": "High",
|
||
"Public": "20200407"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-14060",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060",
|
||
"Impact": "High",
|
||
"Public": "20200614"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-14061",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061",
|
||
"Impact": "High",
|
||
"Public": "20200614"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-14062",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062",
|
||
"Impact": "High",
|
||
"Public": "20200614"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-14195",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14195",
|
||
"Impact": "High",
|
||
"Public": "20200616"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-24616",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24616",
|
||
"Impact": "High",
|
||
"Public": "20200825"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-24750",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750",
|
||
"Impact": "High",
|
||
"Public": "20200917"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35490",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490",
|
||
"Impact": "High",
|
||
"Public": "20201217"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35491",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491",
|
||
"Impact": "High",
|
||
"Public": "20201217"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35728",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728",
|
||
"Impact": "High",
|
||
"Public": "20201227"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36179",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179",
|
||
"Impact": "High",
|
||
"Public": "20210107"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36180",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180",
|
||
"Impact": "High",
|
||
"Public": "20210107"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36181",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36182",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182",
|
||
"Impact": "High",
|
||
"Public": "20210107"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36183",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183",
|
||
"Impact": "High",
|
||
"Public": "20210107"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36184",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36185",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36186",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36187",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36188",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36189",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189",
|
||
"Impact": "High",
|
||
"Public": "20210106"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-8840",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840",
|
||
"Impact": "Critical",
|
||
"Public": "20200210"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-9546",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546",
|
||
"Impact": "Critical",
|
||
"Public": "20200302"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-9547",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547",
|
||
"Impact": "Critical",
|
||
"Public": "20200302"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-9548",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548",
|
||
"Impact": "Critical",
|
||
"Public": "20200302"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20190",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190",
|
||
"Impact": "High",
|
||
"Public": "20210119"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211792001",
|
||
"Comment": "jackson-databind is earlier than 0:2.10.2-alt1_2jpp8"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211792002",
|
||
"Comment": "jackson-databind-javadoc is earlier than 0:2.10.2-alt1_2jpp8"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |