vuln-list-alt/oval/c9f2/ALT-PU-2020-2433/definitions.json
2024-06-28 13:17:52 +00:00

5634 lines
314 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202433",
"Version": "oval:org.altlinux.errata:def:20202433",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2433: package `kernel-image-rpi-def` update to version 5.4.51-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2433",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2433",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-00767",
"RefURL": "https://bdu.fstec.ru/vul/2017-00767",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01352",
"RefURL": "https://bdu.fstec.ru/vul/2019-01352",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02456",
"RefURL": "https://bdu.fstec.ru/vul/2019-02456",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02507",
"RefURL": "https://bdu.fstec.ru/vul/2019-02507",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02688",
"RefURL": "https://bdu.fstec.ru/vul/2019-02688",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02751",
"RefURL": "https://bdu.fstec.ru/vul/2019-02751",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02762",
"RefURL": "https://bdu.fstec.ru/vul/2019-02762",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02777",
"RefURL": "https://bdu.fstec.ru/vul/2019-02777",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02778",
"RefURL": "https://bdu.fstec.ru/vul/2019-02778",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02780",
"RefURL": "https://bdu.fstec.ru/vul/2019-02780",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02915",
"RefURL": "https://bdu.fstec.ru/vul/2019-02915",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03086",
"RefURL": "https://bdu.fstec.ru/vul/2019-03086",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03087",
"RefURL": "https://bdu.fstec.ru/vul/2019-03087",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03088",
"RefURL": "https://bdu.fstec.ru/vul/2019-03088",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03089",
"RefURL": "https://bdu.fstec.ru/vul/2019-03089",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03090",
"RefURL": "https://bdu.fstec.ru/vul/2019-03090",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03091",
"RefURL": "https://bdu.fstec.ru/vul/2019-03091",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03092",
"RefURL": "https://bdu.fstec.ru/vul/2019-03092",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03093",
"RefURL": "https://bdu.fstec.ru/vul/2019-03093",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03094",
"RefURL": "https://bdu.fstec.ru/vul/2019-03094",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03095",
"RefURL": "https://bdu.fstec.ru/vul/2019-03095",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03096",
"RefURL": "https://bdu.fstec.ru/vul/2019-03096",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03097",
"RefURL": "https://bdu.fstec.ru/vul/2019-03097",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03209",
"RefURL": "https://bdu.fstec.ru/vul/2019-03209",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03219",
"RefURL": "https://bdu.fstec.ru/vul/2019-03219",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03220",
"RefURL": "https://bdu.fstec.ru/vul/2019-03220",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03237",
"RefURL": "https://bdu.fstec.ru/vul/2019-03237",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03410",
"RefURL": "https://bdu.fstec.ru/vul/2019-03410",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03478",
"RefURL": "https://bdu.fstec.ru/vul/2019-03478",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03479",
"RefURL": "https://bdu.fstec.ru/vul/2019-03479",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03507",
"RefURL": "https://bdu.fstec.ru/vul/2019-03507",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03626",
"RefURL": "https://bdu.fstec.ru/vul/2019-03626",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03627",
"RefURL": "https://bdu.fstec.ru/vul/2019-03627",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03628",
"RefURL": "https://bdu.fstec.ru/vul/2019-03628",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03630",
"RefURL": "https://bdu.fstec.ru/vul/2019-03630",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03812",
"RefURL": "https://bdu.fstec.ru/vul/2019-03812",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03827",
"RefURL": "https://bdu.fstec.ru/vul/2019-03827",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03996",
"RefURL": "https://bdu.fstec.ru/vul/2019-03996",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04509",
"RefURL": "https://bdu.fstec.ru/vul/2019-04509",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04510",
"RefURL": "https://bdu.fstec.ru/vul/2019-04510",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04511",
"RefURL": "https://bdu.fstec.ru/vul/2019-04511",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04512",
"RefURL": "https://bdu.fstec.ru/vul/2019-04512",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04516",
"RefURL": "https://bdu.fstec.ru/vul/2019-04516",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04518",
"RefURL": "https://bdu.fstec.ru/vul/2019-04518",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04660",
"RefURL": "https://bdu.fstec.ru/vul/2019-04660",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04661",
"RefURL": "https://bdu.fstec.ru/vul/2019-04661",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04662",
"RefURL": "https://bdu.fstec.ru/vul/2019-04662",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04664",
"RefURL": "https://bdu.fstec.ru/vul/2019-04664",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04665",
"RefURL": "https://bdu.fstec.ru/vul/2019-04665",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04666",
"RefURL": "https://bdu.fstec.ru/vul/2019-04666",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04669",
"RefURL": "https://bdu.fstec.ru/vul/2019-04669",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04676",
"RefURL": "https://bdu.fstec.ru/vul/2019-04676",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04677",
"RefURL": "https://bdu.fstec.ru/vul/2019-04677",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04720",
"RefURL": "https://bdu.fstec.ru/vul/2019-04720",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04788",
"RefURL": "https://bdu.fstec.ru/vul/2019-04788",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04798",
"RefURL": "https://bdu.fstec.ru/vul/2019-04798",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04799",
"RefURL": "https://bdu.fstec.ru/vul/2019-04799",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04801",
"RefURL": "https://bdu.fstec.ru/vul/2019-04801",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04802",
"RefURL": "https://bdu.fstec.ru/vul/2019-04802",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04803",
"RefURL": "https://bdu.fstec.ru/vul/2019-04803",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04804",
"RefURL": "https://bdu.fstec.ru/vul/2019-04804",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04805",
"RefURL": "https://bdu.fstec.ru/vul/2019-04805",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04806",
"RefURL": "https://bdu.fstec.ru/vul/2019-04806",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04807",
"RefURL": "https://bdu.fstec.ru/vul/2019-04807",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04809",
"RefURL": "https://bdu.fstec.ru/vul/2019-04809",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04810",
"RefURL": "https://bdu.fstec.ru/vul/2019-04810",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04811",
"RefURL": "https://bdu.fstec.ru/vul/2019-04811",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04812",
"RefURL": "https://bdu.fstec.ru/vul/2019-04812",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04828",
"RefURL": "https://bdu.fstec.ru/vul/2019-04828",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04829",
"RefURL": "https://bdu.fstec.ru/vul/2019-04829",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04830",
"RefURL": "https://bdu.fstec.ru/vul/2019-04830",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04833",
"RefURL": "https://bdu.fstec.ru/vul/2019-04833",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04854",
"RefURL": "https://bdu.fstec.ru/vul/2019-04854",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04855",
"RefURL": "https://bdu.fstec.ru/vul/2019-04855",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04856",
"RefURL": "https://bdu.fstec.ru/vul/2019-04856",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04876",
"RefURL": "https://bdu.fstec.ru/vul/2019-04876",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04892",
"RefURL": "https://bdu.fstec.ru/vul/2019-04892",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00078",
"RefURL": "https://bdu.fstec.ru/vul/2020-00078",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00116",
"RefURL": "https://bdu.fstec.ru/vul/2020-00116",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00118",
"RefURL": "https://bdu.fstec.ru/vul/2020-00118",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00119",
"RefURL": "https://bdu.fstec.ru/vul/2020-00119",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00120",
"RefURL": "https://bdu.fstec.ru/vul/2020-00120",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00121",
"RefURL": "https://bdu.fstec.ru/vul/2020-00121",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00122",
"RefURL": "https://bdu.fstec.ru/vul/2020-00122",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00155",
"RefURL": "https://bdu.fstec.ru/vul/2020-00155",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00156",
"RefURL": "https://bdu.fstec.ru/vul/2020-00156",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00157",
"RefURL": "https://bdu.fstec.ru/vul/2020-00157",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00158",
"RefURL": "https://bdu.fstec.ru/vul/2020-00158",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00159",
"RefURL": "https://bdu.fstec.ru/vul/2020-00159",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00160",
"RefURL": "https://bdu.fstec.ru/vul/2020-00160",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00167",
"RefURL": "https://bdu.fstec.ru/vul/2020-00167",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00195",
"RefURL": "https://bdu.fstec.ru/vul/2020-00195",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00233",
"RefURL": "https://bdu.fstec.ru/vul/2020-00233",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00284",
"RefURL": "https://bdu.fstec.ru/vul/2020-00284",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00285",
"RefURL": "https://bdu.fstec.ru/vul/2020-00285",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00286",
"RefURL": "https://bdu.fstec.ru/vul/2020-00286",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00287",
"RefURL": "https://bdu.fstec.ru/vul/2020-00287",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00288",
"RefURL": "https://bdu.fstec.ru/vul/2020-00288",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00289",
"RefURL": "https://bdu.fstec.ru/vul/2020-00289",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00290",
"RefURL": "https://bdu.fstec.ru/vul/2020-00290",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00291",
"RefURL": "https://bdu.fstec.ru/vul/2020-00291",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00292",
"RefURL": "https://bdu.fstec.ru/vul/2020-00292",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00293",
"RefURL": "https://bdu.fstec.ru/vul/2020-00293",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00294",
"RefURL": "https://bdu.fstec.ru/vul/2020-00294",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00295",
"RefURL": "https://bdu.fstec.ru/vul/2020-00295",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00296",
"RefURL": "https://bdu.fstec.ru/vul/2020-00296",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00297",
"RefURL": "https://bdu.fstec.ru/vul/2020-00297",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00298",
"RefURL": "https://bdu.fstec.ru/vul/2020-00298",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00299",
"RefURL": "https://bdu.fstec.ru/vul/2020-00299",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00338",
"RefURL": "https://bdu.fstec.ru/vul/2020-00338",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00347",
"RefURL": "https://bdu.fstec.ru/vul/2020-00347",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00349",
"RefURL": "https://bdu.fstec.ru/vul/2020-00349",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00350",
"RefURL": "https://bdu.fstec.ru/vul/2020-00350",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00352",
"RefURL": "https://bdu.fstec.ru/vul/2020-00352",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00355",
"RefURL": "https://bdu.fstec.ru/vul/2020-00355",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00356",
"RefURL": "https://bdu.fstec.ru/vul/2020-00356",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00357",
"RefURL": "https://bdu.fstec.ru/vul/2020-00357",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00358",
"RefURL": "https://bdu.fstec.ru/vul/2020-00358",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00360",
"RefURL": "https://bdu.fstec.ru/vul/2020-00360",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00361",
"RefURL": "https://bdu.fstec.ru/vul/2020-00361",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00362",
"RefURL": "https://bdu.fstec.ru/vul/2020-00362",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00367",
"RefURL": "https://bdu.fstec.ru/vul/2020-00367",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00369",
"RefURL": "https://bdu.fstec.ru/vul/2020-00369",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00843",
"RefURL": "https://bdu.fstec.ru/vul/2020-00843",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00844",
"RefURL": "https://bdu.fstec.ru/vul/2020-00844",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00845",
"RefURL": "https://bdu.fstec.ru/vul/2020-00845",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00849",
"RefURL": "https://bdu.fstec.ru/vul/2020-00849",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00853",
"RefURL": "https://bdu.fstec.ru/vul/2020-00853",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01063",
"RefURL": "https://bdu.fstec.ru/vul/2020-01063",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01074",
"RefURL": "https://bdu.fstec.ru/vul/2020-01074",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01321",
"RefURL": "https://bdu.fstec.ru/vul/2020-01321",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01322",
"RefURL": "https://bdu.fstec.ru/vul/2020-01322",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01323",
"RefURL": "https://bdu.fstec.ru/vul/2020-01323",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01324",
"RefURL": "https://bdu.fstec.ru/vul/2020-01324",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01342",
"RefURL": "https://bdu.fstec.ru/vul/2020-01342",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01344",
"RefURL": "https://bdu.fstec.ru/vul/2020-01344",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01384",
"RefURL": "https://bdu.fstec.ru/vul/2020-01384",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01463",
"RefURL": "https://bdu.fstec.ru/vul/2020-01463",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01468",
"RefURL": "https://bdu.fstec.ru/vul/2020-01468",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01488",
"RefURL": "https://bdu.fstec.ru/vul/2020-01488",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01490",
"RefURL": "https://bdu.fstec.ru/vul/2020-01490",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01564",
"RefURL": "https://bdu.fstec.ru/vul/2020-01564",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01602",
"RefURL": "https://bdu.fstec.ru/vul/2020-01602",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01796",
"RefURL": "https://bdu.fstec.ru/vul/2020-01796",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01862",
"RefURL": "https://bdu.fstec.ru/vul/2020-01862",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02140",
"RefURL": "https://bdu.fstec.ru/vul/2020-02140",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02158",
"RefURL": "https://bdu.fstec.ru/vul/2020-02158",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02159",
"RefURL": "https://bdu.fstec.ru/vul/2020-02159",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02161",
"RefURL": "https://bdu.fstec.ru/vul/2020-02161",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02259",
"RefURL": "https://bdu.fstec.ru/vul/2020-02259",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02385",
"RefURL": "https://bdu.fstec.ru/vul/2020-02385",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02427",
"RefURL": "https://bdu.fstec.ru/vul/2020-02427",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02429",
"RefURL": "https://bdu.fstec.ru/vul/2020-02429",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02567",
"RefURL": "https://bdu.fstec.ru/vul/2020-02567",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02919",
"RefURL": "https://bdu.fstec.ru/vul/2020-02919",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02920",
"RefURL": "https://bdu.fstec.ru/vul/2020-02920",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02921",
"RefURL": "https://bdu.fstec.ru/vul/2020-02921",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02944",
"RefURL": "https://bdu.fstec.ru/vul/2020-02944",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03025",
"RefURL": "https://bdu.fstec.ru/vul/2020-03025",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03026",
"RefURL": "https://bdu.fstec.ru/vul/2020-03026",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03071",
"RefURL": "https://bdu.fstec.ru/vul/2020-03071",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03327",
"RefURL": "https://bdu.fstec.ru/vul/2020-03327",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03328",
"RefURL": "https://bdu.fstec.ru/vul/2020-03328",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03329",
"RefURL": "https://bdu.fstec.ru/vul/2020-03329",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03830",
"RefURL": "https://bdu.fstec.ru/vul/2020-03830",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04348",
"RefURL": "https://bdu.fstec.ru/vul/2020-04348",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05796",
"RefURL": "https://bdu.fstec.ru/vul/2020-05796",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05893",
"RefURL": "https://bdu.fstec.ru/vul/2020-05893",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00258",
"RefURL": "https://bdu.fstec.ru/vul/2021-00258",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01920",
"RefURL": "https://bdu.fstec.ru/vul/2021-01920",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02579",
"RefURL": "https://bdu.fstec.ru/vul/2021-02579",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02590",
"RefURL": "https://bdu.fstec.ru/vul/2021-02590",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03056",
"RefURL": "https://bdu.fstec.ru/vul/2021-03056",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03057",
"RefURL": "https://bdu.fstec.ru/vul/2021-03057",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03082",
"RefURL": "https://bdu.fstec.ru/vul/2021-03082",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03187",
"RefURL": "https://bdu.fstec.ru/vul/2021-03187",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03399",
"RefURL": "https://bdu.fstec.ru/vul/2021-03399",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03596",
"RefURL": "https://bdu.fstec.ru/vul/2021-03596",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04865",
"RefURL": "https://bdu.fstec.ru/vul/2021-04865",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06329",
"RefURL": "https://bdu.fstec.ru/vul/2021-06329",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06411",
"RefURL": "https://bdu.fstec.ru/vul/2021-06411",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03138",
"RefURL": "https://bdu.fstec.ru/vul/2022-03138",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03144",
"RefURL": "https://bdu.fstec.ru/vul/2022-03144",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05889",
"RefURL": "https://bdu.fstec.ru/vul/2022-05889",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00161",
"RefURL": "https://bdu.fstec.ru/vul/2023-00161",
"Source": "BDU"
},
{
"RefID": "CVE-2010-5321",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2010-5321",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0569",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0570",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0570",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0571",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0571",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2877",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2877",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7312",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7312",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2853",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2853",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2854",
"Source": "CVE"
},
{
"RefID": "CVE-2018-16871",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20669",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20854",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0145",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0145",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10220",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10638",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10638",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10639",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11191",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11191",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11486",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11486",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11599",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11833",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12378",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12379",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12380",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12381",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12382",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12454",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12455",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12455",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12456",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12456",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12817",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12817",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12818",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12818",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12819",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12984",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12984",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13233",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13233",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13631",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13631",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13648",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13648",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14283",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14283",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14284",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14284",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14814",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14815",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14815",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14816",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14821",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14835",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14895",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14895",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14896",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14896",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14897",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14897",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14901",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15030",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15031",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15031",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15090",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15098",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15098",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15099",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15117",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15117",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15118",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15118",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15211",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15211",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15212",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15212",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15213",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15213",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15214",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15214",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15215",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15215",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15216",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15216",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15217",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15217",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15218",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15218",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15219",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15219",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15220",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15222",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15223",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15291",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15291",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15504",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15504",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15505",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15505",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15666",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15807",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15917",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15918",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15918",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15919",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15919",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15920",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15920",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15921",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15921",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15922",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15922",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15923",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15924",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15924",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16089",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16089",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16413",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16413",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16714",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16714",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16994",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16994",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17052",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17052",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17054",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17054",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17056",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17075",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17075",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17133",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17351",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17351",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18282",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18660",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18683",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18683",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18786",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18806",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18807",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18813",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18813",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18814",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18885",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18885",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19036",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19036",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19037",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19037",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19039",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19039",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19043",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19043",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19045",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19046",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19047",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19048",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19048",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19049",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19049",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19051",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19051",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19052",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19052",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19054",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19054",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19057",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19058",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19059",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19060",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19060",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19061",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19061",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19062",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19063",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19064",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19065",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19066",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19066",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19067",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19068",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19070",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19070",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19071",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19071",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19072",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19073",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19074",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19075",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19075",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19076",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19076",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19077",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19078",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19079",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19079",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19080",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19080",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19081",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19081",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19082",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19082",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19083",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19083",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19227",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19227",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19241",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19241",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19252",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19252",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19332",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19462",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19523",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19524",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19525",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19525",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19526",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19526",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19527",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19527",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19528",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19529",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19529",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19530",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19530",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19531",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19531",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19532",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19533",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19534",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19535",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19535",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19536",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19536",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19537",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19543",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19602",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19767",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19769",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19769",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19770",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19816",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19816",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19922",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19947",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19947",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19965",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19965",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19966",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19966",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20054",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20095",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20096",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20096",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20422",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20422",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20806",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20811",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20908",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20908",
"Source": "CVE"
},
{
"RefID": "CVE-2019-25045",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-25045",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3900",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5108",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9857",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9857",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10720",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10720",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11669",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12114",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12652",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12652",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12769",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12769",
"Source": "CVE"
},
{
"RefID": "CVE-2020-13974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14416",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14416",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25220",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25673",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25673",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786",
"Source": "CVE"
},
{
"RefID": "CVE-2020-7053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20177",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20177",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20317",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20317",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3715",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0030",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0030",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3022",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rpi-def to version 5.4.51-alt2. \nSecurity Fix(es):\n\n * BDU:2017-00767: Уязвимость компонента Kernel Samepage Merging (KSM) операционной системы Linux, позволяющая нарушителю оказать влияние на конфиденциальность информации\n\n * BDU:2019-01352: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02456: Уязвимость реализации протокола NFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02507: Уязвимость компонента arch/powerpc/mm/mmu_context_book3s64.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к содержимому памяти или вызвать повреждение памяти других процессов в системе\n\n * BDU:2019-02688: Уязвимость реализации протокола Siemens R3964 драйвера drivers/tty/n_r3964.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02751: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-02762: Уязвимость функции net_hash_mix () ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-02777: Уязвимость функции do_hidp_sock_ioctl ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02778: Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и получить конфиденциальную информацию\n\n * BDU:2019-02780: Уязвимость файла fs/ext4/extents.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-02915: Уязвимость хеш-функции «jhash» ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03086: Уязвимость драйвера sound/usb/helper.c (motu_microbookii) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03087: Уязвимость драйвера sound/usb/line6/pcm.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03088: Уязвимость драйвера drivers/net/wireless/intersil/p54/p54usb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03089: Уязвимость драйвера drivers/usb/misc/sisusbvga/sisusb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03090: Уязвимость драйвера drivers/media/usb/siano/smsusb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03091: Уязвимость драйвера drivers/media/usb/zr364xx/zr364xx.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03092: Уязвимость драйвера drivers/usb/misc/yurex.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03093: Уязвимость драйвера drivers/media/usb/cpia2/cpia2_usb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03094: Уязвимость компонентов sound/core/init.c и sound/core/info.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03095: Уязвимость драйвера drivers/media/usb/dvb-usb/dvb-usb-init.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03096: Уязвимость драйвера drivers/usb/misc/rio500.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03097: Уязвимость драйвера drivers/media/v4l2-core/v4l2-dev.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03209: Уязвимость драйвера drivers/scsi/qedi/qedi_dbg.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-03219: Уязвимость драйвера drivers/net/wireless/ath/ath10k/usb.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03220: Уязвимость драйвера drivers/net/wireless/ath/ath6kl/usb.c ядра операционных систем Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03237: Уязвимость драйверов drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c и drivers/char/ipmi/ipmi_si_port_io.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-03410: Уязвимость функции set_geometry (drivers/block/floppy.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию\n\n * BDU:2019-03478: Уязвимость функции nbd_genl_status ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03479: Уязвимость драйвера sound/usb/line6/driver.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03507: Уязвимость компонента net/wireless/nl80211.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03626: Уязвимость функции parse_hid_report_descriptor() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-03627: Уязвимость ядра операционной системы Linux, связанная с ошибкой управления ресурсами, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03628: Уязвимость функции setup_format_params() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03630: Уязвимость модуля vhost_net ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03812: Уязвимость функции rtl_p2p_noa_ie из drivers/net/wireless/realtek/rtlwifi/ps.c ядра операционной системы Linux, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-03827: Уязвимость функции write_tpt_entry (drivers/infiniband/hw/cxgb4/mem.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03996: Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04509: Уязвимость функции sof_set_get_large_ctrl_data() (sound/soc/sof/ipc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04510: Уязвимость функции af9005_identify_state() (drivers/media/usb/dvb-usb/af9005.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04511: Уязвимость функции ccp_run_sha_cmd() (drivers/crypto/ccp/ccp-ops.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04512: Уязвимость функции aa_audit_rule_init() (security/apparmor/audit.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04516: Уязвимость функции ql_alloc_large_buffers() (drivers/net/ethernet/qlogic/qla3xxx.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04518: Уязвимость функции dwc3_pci_probe() (drivers/usb/dwc3/dwc3-pci.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04660: Уязвимость функции mlx5_fpga_conn_create_cq() (drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04661: Уязвимость функции gs_can_open() (drivers/net/can/usb/gs_usb.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04662: Уязвимость функции mwifiex_pcie_alloc_cmdrsp_buf() (drivers/net/wireless/marvell/mwifiex/pcie.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04664: Уязвимость функции nl80211_get_ftm_responder_stats() (net/wireless/nl80211.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04665: Уязвимость функции i2400m_op_rfkill_sw_toggle() (drivers/net/wimax/i2400m/op-rfkill.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04666: Уязвимость функции cx23888_ir_probe() (drivers/media/pci/cx23885/cx23888-ir.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04669: Уязвимость функции unittest_data_add() (drivers/of/unittest.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04676: Уязвимость ядра Linux, связанная с переполнения буфера виртуальной памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2019-04677: Уязвимость функции Coalesced_MMIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2019-04720: Уязвимость компонента __xfrm_policy_unlink ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04788: Уязвимость функции из marvell/mwifiex/tdls.c драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04798: Уязвимость функции add_ie_rates (drivers/net/wireless/marvell/libertas/cfg.c) драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04799: Уязвимость функции mwifiex_process_country_ie() (drivers/net/wireless/marvell/mwifiex/sta_ioctl.c) драйвера Marvell WiFi ядра операционной системы Linux, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04801: Уязвимость функции rtl_usb_probe() (drivers/net/wireless/realtek/rtlwifi/usb.c ) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04802: Уязвимость функции crypto_report() (crypto/crypto_user_base.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04803: Уязвимость функции acp_hw_init() (drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04804: Уязвимость функции spi_gpio_probe() (drivers/spi/spi-gpio.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04805: Уязвимость функции rsi_send_beacon() (drivers/net/wireless/rsi/rsi_91x_mgmt.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04806: Уязвимость функции alloc_sgtable() (drivers/net/wireless/intel/iwlwifi/fw/dbg.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04807: Уязвимость функции mwifiex_pcie_init_evt_ring() (drivers/net/wireless/marvell/mwifiex/pcie.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04809: Уязвимость функции bfad_im_get_stats() (drivers/scsi/bfa/bfad_attr.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04810: Уязвимость функции rtl8xxxu_submit_int_urb() (drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04811: Уязвимость функции iwl_pcie_ctxt_info_gen3_init() (drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04812: Уязвимость функции adis_update_scan_mode_burst() (drivers/iio/imu/adis_buffer.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04828: Уязвимость функции fsl_lpspi_probe() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04829: Уязвимость функции adis_update_scan_mode() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04830: Уязвимость функции sdma_init() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04833: Уязвимость драйверов drivers/net/wireless/ath/ath9k/htc_hst.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04854: Уязвимость функции __btrfs_free_extent (fs/btrfs/extent-tree.c) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04855: Уязвимость функции ext4_empty_dir (fs/ext4/namei.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04856: Уязвимость функции btrfs_root_node (fs/btrfs/ctree.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04876: Уязвимость драйвера i40e контроллеров Intel Ethernet серии 700, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-04892: Уязвимость драйвера drivers/net/wireless/ath/ath9k/htc_hst.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00078: Уязвимость функции cfg80211_mgd_wext_giwessid (net/wireless/wext-sme.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2020-00116: Уязвимость функций net/appletalk/aarp.c и net/appletalk/ddp.c подсистемы AppleTalk ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00118: Уязвимость функции clock_source_create() (/gpu /drm/amd/display/dc) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00119: Уязвимость функции create_resource_pool() (drivers/gpu/drm/amd/display/dc) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00120: Уязвимость функции nfp_flower_spawn_vnic_reprs() (drivers/net/ethernet/netronome/nfp/flower/main.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00121: Уязвимость функции nfp_flower_spawn_phy_reprs() (drivers/net/ethernet/netronome/nfp/flower/main.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00122: Уязвимость функции rcar_drif_g_fmt_sdr_cap (drivers/media/platform/rcar_drif.c) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00155: Уязвимость функции qrtr_tun_write_iter() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00156: Уязвимость функции ath10k_usb_hif_tx_sg из drivers/net/wireless/ath/ath10k/usb.c ядра операционной системы Linux, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00157: Уязвимость функции bnxt_re_create_srq() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00158: Уязвимость функции nfp_abm_u32_knode_replace() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00159: Уязвимость функции ca8210_probe() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00160: Уязвимость функции predicate_parse() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00167: Уязвимость функции fs/btrfs/volumes.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00195: Уязвимость драйвера дисплея (drivers/media/platform/vivid) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00233: Уязвимость SMB-клиента ядра операционной системы Linux, позволяющая нарушителю манипулировать файлами в каталоге клиента\n\n * BDU:2020-00284: Уязвимость функции vcs_write (drivers/tty/vt/vc_screen.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-00285: Уязвимость драйвера drivers/media/usb/ttusb-dec/ttusb_dec.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-00286: Уязвимость драйвера drivers/usb/class/cdc-acm.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00287: Уязвимость драйвера drivers/usb/misc/iowarrior.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00288: Уязвимость драйвера drivers/net/ieee802154/atusb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00289: Уязвимость драйвера drivers/usb/core/file.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00290: Уязвимость драйвера drivers/input/ff-memless.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00291: Уязвимость драйвера drivers/net/can/usb/peak_usb/pcan_usb_fd.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-00292: Уязвимость драйвера drivers/usb/misc/adutux.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00293: Уязвимость драйвера drivers/net/can/usb/mcba_usb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00294: Уязвимость функции serial_ir_init_module() (drivers/media/rc/serial_ir.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации\n\n * BDU:2020-00295: Уязвимость драйвера drivers/hid/usbhid/hiddev.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00296: Уязвимость драйвера drivers/net/can/usb/peak_usb/pcan_usb_core.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-00297: Уязвимость драйвера drivers/usb/misc/yurex.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2020-00298: Уязвимость драйвера drivers/net/can/usb/peak_usb/pcan_usb_pro.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-00299: Уязвимость драйвера drivers/nfc/pn533/usb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00338: Уязвимость функции perf_trace_lock_acquire ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00347: Уязвимость функции debugfs_remove ядра операционной системы Linux, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-00349: Уязвимость функции cpu.cfs_quota_us ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00350: Уязвимость компонента drivers/scsi/libsas/sas_discover.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00352: Уязвимость функции __btrfs_map_block ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00355: Уязвимость ядра операционных систем Linux, связанная с недостаточной проверкой вводимых данных и некорректной реализацией функций, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00356: Уязвимость ядра операционных систем Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00357: Уязвимость функции drop_sysctl_table() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00358: Уязвимость функции __feat_register_sp() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00360: Уязвимость реализации команды mwifiex_tm_cmd (drivers/net/wireless/marvell/mwifiex/cfg80211.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00361: Уязвимость функции i915_ppgtt_close (drivers/gpu/drm/i915/i915_gem_gtt.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00362: Уязвимость функции flow_dissector ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00367: Уязвимость функции cpia2_exit() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00369: Уязвимость драйверов HID ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-00843: Уязвимость функции i_size_write () ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00844: Уязвимость функции L2CAP_PARSE_CONF_RSP ядра операционных систем Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00845: Уязвимость функции L2CAP_GET_CONF_OPT ядра операционных систем Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00849: Уязвимость функции fib6_rule_lookup() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00853: Уязвимость функции io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-01063: Уязвимость функции sit_init_net() (net/ipv6/sit.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01074: Уязвимость функции fpregs_state_valid (arch/x86/include/asm/fpu/internal.h) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2020-01321: Уязвимость функции ax25_create из net/ax25/af_ax25.c модуля AF_AX25 ядра операционной системы Linux, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01322: Уязвимость функции ieee802154_create из net/ieee802154/socket.c модуля AF_IEEE802154 ядра операционной системы Linux, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01323: Уязвимость функции atalk_create из net/appletalk/ddp.c модуля AF_APPLETALK ядра операционной системы Linux, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01324: Уязвимость функции base_sock_create из drivers/isdn/mISDN/socket.c модуля AF_ISDN ядра операционной системы Linux, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01342: Уязвимость функции SMB2_negotiate (fs/cifs/smb2pdu.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01344: Уязвимость компонента drivers/media/usb/dvb-usb/technisat-usb2.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2020-01384: Уязвимость драйвера drivers/xen/balloon.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01463: Уязвимость функции SMB2_read ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-01468: Уязвимость функций hci_uart_register_dev () и hci_uart_set_proto () ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-01488: Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2020-01490: Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2020-01564: Уязвимость функции the__ipmi_bmc_register() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01602: Уязвимость функции _ctl_ioctl_main ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01796: Уязвимость функции lbs_ibss_join_existing (drivers/net/wireless/marvell/libertas/cfg.c) драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01862: Уязвимость функции в drivers/net/wireless/rsi/rsi_91x_usb.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02140: Уязвимость функции mptctl_ioctl (drivers/message/fusion/mptctl.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02158: Уязвимость функции «mlx5_fw_fatal_reporter_dump()» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02159: Уязвимость функции « i40e_setup_macvlans» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02161: Уязвимость функции «crypto_reportstat()» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02259: Уязвимость функции SMB2_write (fs/cifs/smb2pdu.c) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-02385: Уязвимость компонента drivers/scsi/libsas/sas_expander.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02427: Уязвимость функции pivot_root (fs/namespace.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02429: Уязвимость компонента drivers/spi/spi-dw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02567: Уязвимость функции load_aout_binary() ядра операционной системы Linux, позволяющая нарушителю обойти механизм защиты ASLR\n\n * BDU:2020-02919: Уязвимость функции dlpar_parse_cc_property (arch/powerpc/platforms/pseries/dlpar.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02920: Уязвимость функции nfc_llcp_build_tlv ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02921: Уязвимость функции __mdiobus_register ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02944: Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-03025: Уязвимость функций rx_queue_add_kobject() и netdev_queue_add_kobject() (net/core/net-sysfs.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03026: Уязвимость функции prb_calc_retire_blk_tmo() (net/packet/af_packet.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03071: Уязвимость компонента drivers/tty/vt/keyboard.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-03327: Уязвимость функции mwifiex_update_vs_ie() драйвера Wi-Fi Marvell ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2020-03328: Уязвимость функции mwifiex_set_uap_rates() драйвера Wi-Fi Marvell ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2020-03329: Уязвимость функции mwifiex_set_wmm_params() драйвера Wi-Fi Marvell ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2020-03830: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04348: Уязвимость функции cgroups ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-05796: Уязвимость функции llcp_sock_create из net/nfc/llcp_sock.c модуля AF_NFC ядра операционной системы Linux, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-05893: Уязвимость запроса гипервизора KVM KVM_GET_EMULATED_CPUID ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * BDU:2021-00258: Уязвимость функции w5864_handle_frame () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01920: Уязвимость реализации протокола MIDI ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-02579: Уязвимость функции idle_book3s ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02590: Уязвимость драйвера drivers/firmware/efi/efi.c ядра операционной системы Linux, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2021-03056: Уязвимость компонента drivers/input/input.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-03057: Уязвимость функции fill_thread_core_info() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2021-03082: Уязвимость функции do_hidp_sock_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-03187: Уязвимость реализации Generic receive offload (GRO) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03399: Уязвимость функции inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c ядра операционной системы Linux, связанная с недостатком механизма освобождения памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03596: Уязвимость функции relay_open из kernel/relay.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04865: Уязвимость ядра операционной системы Linux , связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06329: Уязвимость функции drm_load_edid_firmware (drivers/gpu/drm/drm_edid_load.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06411: Уязвимость компонента sound/usb/mixer.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2022-03138: Уязвимость подсистемы XFRM ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2022-03144: Уязвимость функции route4_change() (net/sched/cls_route.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2022-05889: Уязвимость функции timerqueue_add компонента lib/timerqueue.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00161: Уязвимость функции nvkm_vmm_pfn_map() драйвера GPU Nouveau ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2010-5321: Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf.\n\n * CVE-2015-0569: Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter.\n\n * CVE-2015-0570: Stack-based buffer overflow in the SET_WPS_IE IOCTL implementation in wlan_hdd_hostapd.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that uses a long WPS IE element.\n\n * CVE-2015-0571: The WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify authorization for private SET IOCTL calls, which allows attackers to gain privileges via a crafted application, related to wlan_hdd_hostapd.c and wlan_hdd_wext.c.\n\n * CVE-2015-2877: Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states \"Basically if you care about this attack vector, disable deduplication.\" Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities\n\n * CVE-2015-7312: Multiple race conditions in the Advanced Union Filesystem (aufs) aufs3-mmap.patch and aufs4-mmap.patch patches for the Linux kernel 3.x and 4.x allow local users to cause a denial of service (use-after-free and BUG) or possibly gain privileges via a (1) madvise or (2) msync system call, related to mm/madvise.c and mm/msync.c.\n\n * CVE-2016-2853: The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.\n\n * CVE-2016-2854: The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.\n\n * CVE-2018-16871: A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.\n\n * CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.\n\n * CVE-2018-20854: An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl-\u003ephys out-of-bounds read.\n\n * CVE-2019-0145: Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.\n\n * CVE-2019-10220: Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.\n\n * CVE-2019-10638: In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.\n\n * CVE-2019-10639: The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.\n\n * CVE-2019-11191: The Linux kernel through 5.0.7, when CONFIG_IA32_AOUT is enabled and ia32_aout is loaded, allows local users to bypass ASLR on setuid a.out programs (if any exist) because install_exec_creds() is called too late in load_aout_binary() in fs/binfmt_aout.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. NOTE: the software maintainer disputes that this is a vulnerability because ASLR for a.out format executables has never been supported\n\n * CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.\n\n * CVE-2019-11599: The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.\n\n * CVE-2019-11811: An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.\n\n * CVE-2019-11833: fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.\n\n * CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\\0' character.\n\n * CVE-2019-12378: An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This has been disputed as not an issue\n\n * CVE-2019-12379: An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. NOTE: This id is disputed as not being an issue\n\n * CVE-2019-12380: **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.\n\n * CVE-2019-12381: An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL\n\n * CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference\n\n * CVE-2019-12454: An issue was discovered in wcd9335_codec_enable_dec in sound/soc/codecs/wcd9335.c in the Linux kernel through 5.1.5. It uses kstrndup instead of kmemdup_nul, which allows attackers to have an unspecified impact via unknown vectors. NOTE: The vendor disputes this issues as not being a vulnerability because switching to kmemdup_nul() would only fix a security issue if the source string wasn't NUL-terminated, which is not the case\n\n * CVE-2019-12455: An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because “The memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.”\n\n * CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used\n\n * CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).\n\n * CVE-2019-12817: arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.\n\n * CVE-2019-12818: An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.\n\n * CVE-2019-12819: An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.\n\n * CVE-2019-12984: A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.\n\n * CVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.\n\n * CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.\n\n * CVE-2019-13648: In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.\n\n * CVE-2019-14283: In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.\n\n * CVE-2019-14284: In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.\n\n * CVE-2019-14814: There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.\n\n * CVE-2019-14815: A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.\n\n * CVE-2019-14816: There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.\n\n * CVE-2019-14821: An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-\u003efirst' and 'ring-\u003elast' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.\n\n * CVE-2019-14835: A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.\n\n * CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.\n\n * CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.\n\n * CVE-2019-14897: A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.\n\n * CVE-2019-14901: A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.\n\n * CVE-2019-15030: In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.\n\n * CVE-2019-15031: In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.\n\n * CVE-2019-15090: An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.\n\n * CVE-2019-15098: drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.\n\n * CVE-2019-15099: drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.\n\n * CVE-2019-15117: parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.\n\n * CVE-2019-15118: check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.\n\n * CVE-2019-15211: An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.\n\n * CVE-2019-15212: An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.\n\n * CVE-2019-15213: An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.\n\n * CVE-2019-15214: An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.\n\n * CVE-2019-15215: An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.\n\n * CVE-2019-15216: An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.\n\n * CVE-2019-15217: An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.\n\n * CVE-2019-15218: An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.\n\n * CVE-2019-15219: An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.\n\n * CVE-2019-15220: An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.\n\n * CVE-2019-15221: An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.\n\n * CVE-2019-15222: An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.\n\n * CVE-2019-15223: An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/driver.c driver.\n\n * CVE-2019-15291: An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.\n\n * CVE-2019-15504: drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).\n\n * CVE-2019-15505: drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).\n\n * CVE-2019-15666: An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.\n\n * CVE-2019-15807: In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.\n\n * CVE-2019-15917: An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.\n\n * CVE-2019-15918: An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21.\n\n * CVE-2019-15919: An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.\n\n * CVE-2019-15920: An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.\n\n * CVE-2019-15921: An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.\n\n * CVE-2019-15922: An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a pf data structure if alloc_disk fails in drivers/block/paride/pf.c.\n\n * CVE-2019-15923: An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a cd data structure if alloc_disk fails in drivers/block/paride/pf.c.\n\n * CVE-2019-15924: An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.\n\n * CVE-2019-16089: An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.\n\n * CVE-2019-16413: An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.\n\n * CVE-2019-16714: In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.\n\n * CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.\n\n * CVE-2019-16994: In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.\n\n * CVE-2019-17052: ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel 3.16 through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.\n\n * CVE-2019-17053: ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.\n\n * CVE-2019-17054: atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.\n\n * CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.\n\n * CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.\n\n * CVE-2019-17075: An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance.\n\n * CVE-2019-17133: In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.\n\n * CVE-2019-17351: An issue was discovered in drivers/xen/balloon.c in the Linux kernel before 5.2.3, as used in Xen through 4.12.x, allowing guest OS users to cause a denial of service because of unrestricted resource consumption during the mapping of guest memory, aka CID-6ef36ab967c7.\n\n * CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.\n\n * CVE-2019-18282: The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.\n\n * CVE-2019-18660: The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.\n\n * CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.\n\n * CVE-2019-18786: In the Linux kernel through 5.3.8, f-\u003efmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.\n\n * CVE-2019-18806: A memory leak in the ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service (memory consumption) by triggering pci_dma_mapping_error() failures, aka CID-1acb8f2a7a9f.\n\n * CVE-2019-18807: Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11.\n\n * CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.\n\n * CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.\n\n * CVE-2019-18811: A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.\n\n * CVE-2019-18813: A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.\n\n * CVE-2019-18814: An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.\n\n * CVE-2019-18885: fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices-\u003edevices is mishandled within find_device, aka CID-09ba3bc9dd15.\n\n * CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.\n\n * CVE-2019-19037: ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.\n\n * CVE-2019-19039: __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.\n\n * CVE-2019-19043: A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.\n\n * CVE-2019-19045: A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.\n\n * CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time\n\n * CVE-2019-19047: A memory leak in the mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_crdump_collect() failures, aka CID-c7ed6d0183d5.\n\n * CVE-2019-19048: A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.\n\n * CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot\n\n * CVE-2019-19051: A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.\n\n * CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.\n\n * CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.\n\n * CVE-2019-19055: A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred\n\n * CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.\n\n * CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.\n\n * CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.\n\n * CVE-2019-19059: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.\n\n * CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.\n\n * CVE-2019-19061: A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.\n\n * CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.\n\n * CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.\n\n * CVE-2019-19064: A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time\n\n * CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\n\n * CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.\n\n * CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading\n\n * CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.\n\n * CVE-2019-19070: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began\n\n * CVE-2019-19071: A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.\n\n * CVE-2019-19072: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.\n\n * CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.\n\n * CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n\n * CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.\n\n * CVE-2019-19076: A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted\n\n * CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.\n\n * CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.\n\n * CVE-2019-19079: A memory leak in the qrtr_tun_write_iter() function in net/qrtr/tun.c in the Linux kernel before 5.3 allows attackers to cause a denial of service (memory consumption), aka CID-a21b7f0cff19.\n\n * CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.\n\n * CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.\n\n * CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.\n\n * CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.\n\n * CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.\n\n * CVE-2019-19241: In the Linux kernel before 5.4.2, the io_uring feature leads to requests that inadvertently have UID 0 and full capabilities, aka CID-181e448d8709. This is related to fs/io-wq.c, fs/io_uring.c, and net/socket.c. For example, an attacker can bypass intended restrictions on adding an IPv4 address to the loopback interface. This occurs because IORING_OP_SENDMSG operations, although requested in the context of an unprivileged user, are sometimes performed by a kernel worker thread without considering that context.\n\n * CVE-2019-19252: vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.\n\n * CVE-2019-19332: An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.\n\n * CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.\n\n * CVE-2019-19523: In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.\n\n * CVE-2019-19524: In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.\n\n * CVE-2019-19525: In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.\n\n * CVE-2019-19526: In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.\n\n * CVE-2019-19527: In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.\n\n * CVE-2019-19528: In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.\n\n * CVE-2019-19529: In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.\n\n * CVE-2019-19530: In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.\n\n * CVE-2019-19531: In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.\n\n * CVE-2019-19532: In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.\n\n * CVE-2019-19533: In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.\n\n * CVE-2019-19534: In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.\n\n * CVE-2019-19535: In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.\n\n * CVE-2019-19536: In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.\n\n * CVE-2019-19537: In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.\n\n * CVE-2019-19543: In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.\n\n * CVE-2019-19602: fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.\n\n * CVE-2019-19767: The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.\n\n * CVE-2019-19769: In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).\n\n * CVE-2019-19770: In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace\n\n * CVE-2019-19816: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.\n\n * CVE-2019-19922: kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)\n\n * CVE-2019-19947: In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.\n\n * CVE-2019-19965: In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.\n\n * CVE-2019-19966: In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.\n\n * CVE-2019-20054: In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.\n\n * CVE-2019-20095: mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.\n\n * CVE-2019-20096: In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.\n\n * CVE-2019-20422: In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db.\n\n * CVE-2019-20636: In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.\n\n * CVE-2019-20806: An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.\n\n * CVE-2019-20811: An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.\n\n * CVE-2019-20812: An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.\n\n * CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.\n\n * CVE-2019-25045: An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.\n\n * CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.\n\n * CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.\n\n * CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.\n\n * CVE-2019-5108: An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.\n\n * CVE-2019-7221: The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.\n\n * CVE-2019-7222: The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.\n\n * CVE-2019-9857: In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service.\n\n * CVE-2020-10720: A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.\n\n * CVE-2020-10732: A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.\n\n * CVE-2020-11669: An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.\n\n * CVE-2020-12114: A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.\n\n * CVE-2020-12652: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"\n\n * CVE-2020-12769: An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.\n\n * CVE-2020-13974: An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.\n\n * CVE-2020-14416: In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.\n\n * CVE-2020-25220: The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd-\u003eno_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.\n\n * CVE-2020-25673: A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.\n\n * CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2020-7053: In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.\n\n * CVE-2021-20177: A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.\n\n * CVE-2021-20317: A flaw was found in the Linux kernel. A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.\n\n * CVE-2021-3715: A flaw was found in the \"Routing decision\" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2023-0030: A use-after-free flaw was found in the Linux kernels nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-3022: A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-07-23"
},
"Updated": {
"Date": "2020-07-23"
},
"BDUs": [
{
"ID": "BDU:2017-00767",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2017-00767",
"Impact": "Low",
"Public": "20170302"
},
{
"ID": "BDU:2019-01352",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01352",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-02456",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-02456",
"Impact": "High",
"Public": "20181108"
},
{
"ID": "BDU:2019-02507",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-02507",
"Impact": "High",
"Public": "20190612"
},
{
"ID": "BDU:2019-02688",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2019-02688",
"Impact": "High",
"Public": "20190405"
},
{
"ID": "BDU:2019-02751",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-02751",
"Impact": "High",
"Public": "20190607"
},
{
"ID": "BDU:2019-02762",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-326",
"Href": "https://bdu.fstec.ru/vul/2019-02762",
"Impact": "High",
"Public": "20190328"
},
{
"ID": "BDU:2019-02777",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-02777",
"Impact": "Low",
"Public": "20190614"
},
{
"ID": "BDU:2019-02778",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2019-02778",
"Impact": "High",
"Public": "20190419"
},
{
"ID": "BDU:2019-02780",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2019-02780",
"Impact": "Low",
"Public": "20190510"
},
{
"ID": "BDU:2019-02915",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-326",
"Href": "https://bdu.fstec.ru/vul/2019-02915",
"Impact": "Low",
"Public": "20190327"
},
{
"ID": "BDU:2019-03086",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03086",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03087",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03087",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03088",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03088",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03089",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03089",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03090",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03090",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03091",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03091",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03092",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03092",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03093",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03093",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03094",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03094",
"Impact": "Low",
"Public": "20190416"
},
{
"ID": "BDU:2019-03095",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03095",
"Impact": "Low",
"Public": "20190522"
},
{
"ID": "BDU:2019-03096",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2019-03096",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03097",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03097",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03209",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-03209",
"Impact": "Low",
"Public": "20190513"
},
{
"ID": "BDU:2019-03219",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03219",
"Impact": "High",
"Public": "20190814"
},
{
"ID": "BDU:2019-03220",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03220",
"Impact": "Low",
"Public": "20190814"
},
{
"ID": "BDU:2019-03237",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03237",
"Impact": "High",
"Public": "20190209"
},
{
"ID": "BDU:2019-03410",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
"CWE": "CWE-125, CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-03410",
"Impact": "Low",
"Public": "20190717"
},
{
"ID": "BDU:2019-03478",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03478",
"Impact": "Low",
"Public": "20190905"
},
{
"ID": "BDU:2019-03479",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03479",
"Impact": "Low",
"Public": "20190528"
},
{
"ID": "BDU:2019-03507",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-03507",
"Impact": "Critical",
"Public": "20190923"
},
{
"ID": "BDU:2019-03626",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-03626",
"Impact": "Low",
"Public": "20190713"
},
{
"ID": "BDU:2019-03627",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2019-03627",
"Impact": "Low",
"Public": "20190718"
},
{
"ID": "BDU:2019-03628",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://bdu.fstec.ru/vul/2019-03628",
"Impact": "Low",
"Public": "20190717"
},
{
"ID": "BDU:2019-03630",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-03630",
"Impact": "Low",
"Public": "20190424"
},
{
"ID": "BDU:2019-03812",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-03812",
"Impact": "High",
"Public": "20191015"
},
{
"ID": "BDU:2019-03827",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-03827",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-03996",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03996",
"Impact": "Low",
"Public": "20190207"
},
{
"ID": "BDU:2019-04509",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04509",
"Impact": "Low",
"Public": "20191028"
},
{
"ID": "BDU:2019-04510",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04510",
"Impact": "Low",
"Public": "20191024"
},
{
"ID": "BDU:2019-04511",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04511",
"Impact": "High",
"Public": "20191005"
},
{
"ID": "BDU:2019-04512",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04512",
"Impact": "Critical",
"Public": "20191106"
},
{
"ID": "BDU:2019-04516",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04516",
"Impact": "Low",
"Public": "20191004"
},
{
"ID": "BDU:2019-04518",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04518",
"Impact": "High",
"Public": "20191027"
},
{
"ID": "BDU:2019-04660",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04660",
"Impact": "High",
"Public": "20191018"
},
{
"ID": "BDU:2019-04661",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04661",
"Impact": "High",
"Public": "20191104"
},
{
"ID": "BDU:2019-04662",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04662",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2019-04664",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04664",
"Impact": "Low",
"Public": "20191007"
},
{
"ID": "BDU:2019-04665",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04665",
"Impact": "High",
"Public": "20190911"
},
{
"ID": "BDU:2019-04666",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04666",
"Impact": "Low",
"Public": "20191007"
},
{
"ID": "BDU:2019-04669",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04669",
"Impact": "High",
"Public": "20191023"
},
{
"ID": "BDU:2019-04676",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-04676",
"Impact": "High",
"Public": "20190911"
},
{
"ID": "BDU:2019-04677",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04677",
"Impact": "High",
"Public": "20190918"
},
{
"ID": "BDU:2019-04720",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04720",
"Impact": "Low",
"Public": "20190301"
},
{
"ID": "BDU:2019-04788",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-400, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04788",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2019-04798",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04798",
"Impact": "Critical",
"Public": "20191126"
},
{
"ID": "BDU:2019-04799",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04799",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2019-04801",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04801",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04802",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04802",
"Impact": "Low",
"Public": "20191010"
},
{
"ID": "BDU:2019-04803",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04803",
"Impact": "High",
"Public": "20191002"
},
{
"ID": "BDU:2019-04804",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04804",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04805",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04805",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04806",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04806",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04807",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04807",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2019-04809",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04809",
"Impact": "Low",
"Public": "20190930"
},
{
"ID": "BDU:2019-04810",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04810",
"Impact": "Low",
"Public": "20191002"
},
{
"ID": "BDU:2019-04811",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04811",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2019-04812",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04812",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04828",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04828",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04829",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04829",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04830",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04830",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "BDU:2019-04833",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04833",
"Impact": "Low",
"Public": "20190910"
},
{
"ID": "BDU:2019-04854",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-532",
"Href": "https://bdu.fstec.ru/vul/2019-04854",
"Impact": "Low",
"Public": "20191119"
},
{
"ID": "BDU:2019-04855",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04855",
"Impact": "Low",
"Public": "20191120"
},
{
"ID": "BDU:2019-04856",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04856",
"Impact": "Low",
"Public": "20190909"
},
{
"ID": "BDU:2019-04876",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-04876",
"Impact": "High",
"Public": "20190504"
},
{
"ID": "BDU:2019-04892",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04892",
"Impact": "High",
"Public": "20190910"
},
{
"ID": "BDU:2020-00078",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2020-00078",
"Impact": "Critical",
"Public": "20191003"
},
{
"ID": "BDU:2020-00116",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00116",
"Impact": "Low",
"Public": "20190315"
},
{
"ID": "BDU:2020-00118",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00118",
"Impact": "Low",
"Public": "20191002"
},
{
"ID": "BDU:2020-00119",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00119",
"Impact": "Low",
"Public": "20190925"
},
{
"ID": "BDU:2020-00120",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00120",
"Impact": "Low",
"Public": "20190927"
},
{
"ID": "BDU:2020-00121",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00121",
"Impact": "Low",
"Public": "20190927"
},
{
"ID": "BDU:2020-00122",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2020-00122",
"Impact": "Low",
"Public": "20191105"
},
{
"ID": "BDU:2020-00155",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00155",
"Impact": "High",
"Public": "20190912"
},
{
"ID": "BDU:2020-00156",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00156",
"Impact": "High",
"Public": "20190923"
},
{
"ID": "BDU:2020-00157",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00157",
"Impact": "Low",
"Public": "20190913"
},
{
"ID": "BDU:2020-00158",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00158",
"Impact": "Low",
"Public": "20190927"
},
{
"ID": "BDU:2020-00159",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00159",
"Impact": "High",
"Public": "20190927"
},
{
"ID": "BDU:2020-00160",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00160",
"Impact": "Low",
"Public": "20190928"
},
{
"ID": "BDU:2020-00167",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00167",
"Impact": "Low",
"Public": "20190225"
},
{
"ID": "BDU:2020-00195",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00195",
"Impact": "High",
"Public": "20191103"
},
{
"ID": "BDU:2020-00233",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2020-00233",
"Impact": "High",
"Public": "20191005"
},
{
"ID": "BDU:2020-00284",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-00284",
"Impact": "High",
"Public": "20191124"
},
{
"ID": "BDU:2020-00285",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-00285",
"Impact": "Low",
"Public": "20190821"
},
{
"ID": "BDU:2020-00286",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00286",
"Impact": "Low",
"Public": "20190815"
},
{
"ID": "BDU:2020-00287",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00287",
"Impact": "Low",
"Public": "20191010"
},
{
"ID": "BDU:2020-00288",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00288",
"Impact": "Low",
"Public": "20190919"
},
{
"ID": "BDU:2020-00289",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-00289",
"Impact": "Low",
"Public": "20190812"
},
{
"ID": "BDU:2020-00290",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00290",
"Impact": "Low",
"Public": "20191115"
},
{
"ID": "BDU:2020-00291",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2020-00291",
"Impact": "Low",
"Public": "20190802"
},
{
"ID": "BDU:2020-00292",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00292",
"Impact": "Low",
"Public": "20191004"
},
{
"ID": "BDU:2020-00293",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00293",
"Impact": "Low",
"Public": "20191104"
},
{
"ID": "BDU:2020-00294",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00294",
"Impact": "High",
"Public": "20190319"
},
{
"ID": "BDU:2020-00295",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00295",
"Impact": "Low",
"Public": "20190806"
},
{
"ID": "BDU:2020-00296",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2020-00296",
"Impact": "Low",
"Public": "20191104"
},
{
"ID": "BDU:2020-00297",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00297",
"Impact": "Low",
"Public": "20190805"
},
{
"ID": "BDU:2020-00298",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2020-00298",
"Impact": "Low",
"Public": "20190802"
},
{
"ID": "BDU:2020-00299",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00299",
"Impact": "Low",
"Public": "20191008"
},
{
"ID": "BDU:2020-00338",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00338",
"Impact": "Low",
"Public": "20191211"
},
{
"ID": "BDU:2020-00347",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00347",
"Impact": "High",
"Public": "20191211"
},
{
"ID": "BDU:2020-00349",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-00349",
"Impact": "Low",
"Public": "20190808"
},
{
"ID": "BDU:2020-00350",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00350",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "BDU:2020-00352",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-00352",
"Impact": "High",
"Public": "20190429"
},
{
"ID": "BDU:2020-00355",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-287, CWE-440",
"Href": "https://bdu.fstec.ru/vul/2020-00355",
"Impact": "Low",
"Public": "20190911"
},
{
"ID": "BDU:2020-00356",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2020-00356",
"Impact": "Low",
"Public": "20191208"
},
{
"ID": "BDU:2020-00357",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00357",
"Impact": "Low",
"Public": "20190329"
},
{
"ID": "BDU:2020-00358",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00358",
"Impact": "Low",
"Public": "20190401"
},
{
"ID": "BDU:2020-00360",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-722",
"Href": "https://bdu.fstec.ru/vul/2020-00360",
"Impact": "Low",
"Public": "20190404"
},
{
"ID": "BDU:2020-00361",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00361",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "BDU:2020-00362",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-328, CWE-330",
"Href": "https://bdu.fstec.ru/vul/2020-00362",
"Impact": "Low",
"Public": "20191023"
},
{
"ID": "BDU:2020-00367",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00367",
"Impact": "Low",
"Public": "20190319"
},
{
"ID": "BDU:2020-00369",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-00369",
"Impact": "Low",
"Public": "20191003"
},
{
"ID": "BDU:2020-00843",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2020-00843",
"Impact": "High",
"Public": "20190303"
},
{
"ID": "BDU:2020-00844",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-00844",
"Impact": "Low",
"Public": "20190123"
},
{
"ID": "BDU:2020-00845",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-00845",
"Impact": "Low",
"Public": "20190123"
},
{
"ID": "BDU:2020-00849",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-755",
"Href": "https://bdu.fstec.ru/vul/2020-00849",
"Impact": "Low",
"Public": "20190920"
},
{
"ID": "BDU:2020-00853",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-00853",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01063",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-01063",
"Impact": "High",
"Public": "20190302"
},
{
"ID": "BDU:2020-01074",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-362, CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01074",
"Impact": "High",
"Public": "20191128"
},
{
"ID": "BDU:2020-01321",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-01321",
"Impact": "Low",
"Public": "20190924"
},
{
"ID": "BDU:2020-01322",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-01322",
"Impact": "Low",
"Public": "20190924"
},
{
"ID": "BDU:2020-01323",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-01323",
"Impact": "Low",
"Public": "20190924"
},
{
"ID": "BDU:2020-01324",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20, CWE-862",
"Href": "https://bdu.fstec.ru/vul/2020-01324",
"Impact": "Low",
"Public": "20190924"
},
{
"ID": "BDU:2020-01342",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01342",
"Impact": "High",
"Public": "20190416"
},
{
"ID": "BDU:2020-01344",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01344",
"Impact": "Critical",
"Public": "20190722"
},
{
"ID": "BDU:2020-01384",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-770",
"Href": "https://bdu.fstec.ru/vul/2020-01384",
"Impact": "Low",
"Public": "20190718"
},
{
"ID": "BDU:2020-01463",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01463",
"Impact": "Low",
"Public": "20190416"
},
{
"ID": "BDU:2020-01468",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01468",
"Impact": "High",
"Public": "20190226"
},
{
"ID": "BDU:2020-01488",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-20, CWE-862",
"Href": "https://bdu.fstec.ru/vul/2020-01488",
"Impact": "Low",
"Public": "20190905"
},
{
"ID": "BDU:2020-01490",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-200, CWE-662",
"Href": "https://bdu.fstec.ru/vul/2020-01490",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "BDU:2020-01564",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-01564",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01602",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01602",
"Impact": "High",
"Public": "20190529"
},
{
"ID": "BDU:2020-01796",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-121, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01796",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2020-01862",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2020-01862",
"Impact": "Critical",
"Public": "20190822"
},
{
"ID": "BDU:2020-02140",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-02140",
"Impact": "Low",
"Public": "20200115"
},
{
"ID": "BDU:2020-02158",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-02158",
"Impact": "Low",
"Public": "20191106"
},
{
"ID": "BDU:2020-02159",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-02159",
"Impact": "Low",
"Public": "20191106"
},
{
"ID": "BDU:2020-02161",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-02161",
"Impact": "High",
"Public": "20191106"
},
{
"ID": "BDU:2020-02259",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02259",
"Impact": "Low",
"Public": "20190416"
},
{
"ID": "BDU:2020-02385",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399, CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-02385",
"Impact": "Low",
"Public": "20190529"
},
{
"ID": "BDU:2020-02427",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-02427",
"Impact": "Low",
"Public": "20200504"
},
{
"ID": "BDU:2020-02429",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-662",
"Href": "https://bdu.fstec.ru/vul/2020-02429",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "BDU:2020-02567",
"CVSS": "AV:L/AC:H/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-02567",
"Impact": "Low",
"Public": "20190305"
},
{
"ID": "BDU:2020-02919",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02919",
"Impact": "Low",
"Public": "20190602"
},
{
"ID": "BDU:2020-02920",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02920",
"Impact": "High",
"Public": "20190227"
},
{
"ID": "BDU:2020-02921",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02921",
"Impact": "Low",
"Public": "20190613"
},
{
"ID": "BDU:2020-02944",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-02944",
"Impact": "Low",
"Public": "20191114"
},
{
"ID": "BDU:2020-03025",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:C/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-460",
"Href": "https://bdu.fstec.ru/vul/2020-03025",
"Impact": "Low",
"Public": "20190319"
},
{
"ID": "BDU:2020-03026",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-03026",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "BDU:2020-03071",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-03071",
"Impact": "High",
"Public": "20200527"
},
{
"ID": "BDU:2020-03327",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120, CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03327",
"Impact": "High",
"Public": "20190903"
},
{
"ID": "BDU:2020-03328",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120, CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03328",
"Impact": "High",
"Public": "20190903"
},
{
"ID": "BDU:2020-03329",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03329",
"Impact": "High",
"Public": "20190903"
},
{
"ID": "BDU:2020-03830",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03830",
"Impact": "Low",
"Public": "20200122"
},
{
"ID": "BDU:2020-04348",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-04348",
"Impact": "High",
"Public": "20200821"
},
{
"ID": "BDU:2020-05796",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-05796",
"Impact": "Low",
"Public": "20190924"
},
{
"ID": "BDU:2020-05893",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-05893",
"Impact": "Low",
"Public": "20191204"
},
{
"ID": "BDU:2021-00258",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-00258",
"Impact": "Low",
"Public": "20190329"
},
{
"ID": "BDU:2021-01920",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01920",
"Impact": "High",
"Public": "20200507"
},
{
"ID": "BDU:2021-02579",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-393, CWE-399",
"Href": "https://bdu.fstec.ru/vul/2021-02579",
"Impact": "Low",
"Public": "20190421"
},
{
"ID": "BDU:2021-02590",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2021-02590",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2021-03056",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03056",
"Impact": "Low",
"Public": "20191213"
},
{
"ID": "BDU:2021-03057",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2021-03057",
"Impact": "Low",
"Public": "20200528"
},
{
"ID": "BDU:2021-03082",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-03082",
"Impact": "Low",
"Public": "20190423"
},
{
"ID": "BDU:2021-03187",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-03187",
"Impact": "Low",
"Public": "20190530"
},
{
"ID": "BDU:2021-03399",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-03399",
"Impact": "Low",
"Public": "20190311"
},
{
"ID": "BDU:2021-03596",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-03596",
"Impact": "Low",
"Public": "20191128"
},
{
"ID": "BDU:2021-04865",
"CVSS": "AV:L/AC:L/Au:M/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-04865",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "BDU:2021-06329",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-06329",
"Impact": "Low",
"Public": "20190507"
},
{
"ID": "BDU:2021-06411",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-06411",
"Impact": "High",
"Public": "20190814"
},
{
"ID": "BDU:2022-03138",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03138",
"Impact": "High",
"Public": "20190326"
},
{
"ID": "BDU:2022-03144",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03144",
"Impact": "High",
"Public": "20200316"
},
{
"ID": "BDU:2022-05889",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://bdu.fstec.ru/vul/2022-05889",
"Impact": "Low",
"Public": "20190724"
},
{
"ID": "BDU:2023-00161",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00161",
"Impact": "Low",
"Public": "20230109"
}
],
"CVEs": [
{
"ID": "CVE-2010-5321",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2010-5321",
"Impact": "Low",
"Public": "20170424"
},
{
"ID": "CVE-2015-0569",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0569",
"Impact": "High",
"Public": "20160509"
},
{
"ID": "CVE-2015-0570",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0570",
"Impact": "High",
"Public": "20160509"
},
{
"ID": "CVE-2015-0571",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0571",
"Impact": "High",
"Public": "20160509"
},
{
"ID": "CVE-2015-2877",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2877",
"Impact": "Low",
"Public": "20170303"
},
{
"ID": "CVE-2015-7312",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7312",
"Impact": "Low",
"Public": "20151116"
},
{
"ID": "CVE-2016-2853",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2853",
"Impact": "High",
"Public": "20160502"
},
{
"ID": "CVE-2016-2854",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2854",
"Impact": "High",
"Public": "20160502"
},
{
"ID": "CVE-2018-16871",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871",
"Impact": "High",
"Public": "20190730"
},
{
"ID": "CVE-2018-20669",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20669",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2018-20854",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20854",
"Impact": "High",
"Public": "20190726"
},
{
"ID": "CVE-2019-0145",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0145",
"Impact": "High",
"Public": "20191114"
},
{
"ID": "CVE-2019-10220",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10220",
"Impact": "High",
"Public": "20191127"
},
{
"ID": "CVE-2019-10638",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-326",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10638",
"Impact": "Low",
"Public": "20190705"
},
{
"ID": "CVE-2019-10639",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-326",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639",
"Impact": "High",
"Public": "20190705"
},
{
"ID": "CVE-2019-11191",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11191",
"Impact": "Low",
"Public": "20190412"
},
{
"ID": "CVE-2019-11486",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11486",
"Impact": "High",
"Public": "20190423"
},
{
"ID": "CVE-2019-11599",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599",
"Impact": "High",
"Public": "20190429"
},
{
"ID": "CVE-2019-11811",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11811",
"Impact": "High",
"Public": "20190507"
},
{
"ID": "CVE-2019-11833",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
"Impact": "Low",
"Public": "20190515"
},
{
"ID": "CVE-2019-11884",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884",
"Impact": "Low",
"Public": "20190510"
},
{
"ID": "CVE-2019-12378",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12378",
"Impact": "Low",
"Public": "20190528"
},
{
"ID": "CVE-2019-12379",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12379",
"Impact": "Low",
"Public": "20190528"
},
{
"ID": "CVE-2019-12380",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-388",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12380",
"Impact": "Low",
"Public": "20190528"
},
{
"ID": "CVE-2019-12381",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12381",
"Impact": "Low",
"Public": "20190528"
},
{
"ID": "CVE-2019-12382",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12382",
"Impact": "Low",
"Public": "20190528"
},
{
"ID": "CVE-2019-12454",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12454",
"Impact": "High",
"Public": "20190530"
},
{
"ID": "CVE-2019-12455",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12455",
"Impact": "Low",
"Public": "20190530"
},
{
"ID": "CVE-2019-12456",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12456",
"Impact": "High",
"Public": "20190530"
},
{
"ID": "CVE-2019-12614",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614",
"Impact": "Low",
"Public": "20190603"
},
{
"ID": "CVE-2019-12817",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12817",
"Impact": "High",
"Public": "20190625"
},
{
"ID": "CVE-2019-12818",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12818",
"Impact": "High",
"Public": "20190614"
},
{
"ID": "CVE-2019-12819",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819",
"Impact": "Low",
"Public": "20190614"
},
{
"ID": "CVE-2019-12984",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12984",
"Impact": "Low",
"Public": "20190626"
},
{
"ID": "CVE-2019-13233",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13233",
"Impact": "High",
"Public": "20190704"
},
{
"ID": "CVE-2019-13631",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13631",
"Impact": "Low",
"Public": "20190717"
},
{
"ID": "CVE-2019-13648",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13648",
"Impact": "Low",
"Public": "20190719"
},
{
"ID": "CVE-2019-14283",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14283",
"Impact": "Low",
"Public": "20190726"
},
{
"ID": "CVE-2019-14284",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14284",
"Impact": "Low",
"Public": "20190726"
},
{
"ID": "CVE-2019-14814",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14814",
"Impact": "High",
"Public": "20190920"
},
{
"ID": "CVE-2019-14815",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14815",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-14816",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816",
"Impact": "High",
"Public": "20190920"
},
{
"ID": "CVE-2019-14821",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"Impact": "High",
"Public": "20190919"
},
{
"ID": "CVE-2019-14835",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14835",
"Impact": "High",
"Public": "20190917"
},
{
"ID": "CVE-2019-14895",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14895",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-14896",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14896",
"Impact": "Critical",
"Public": "20191127"
},
{
"ID": "CVE-2019-14897",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14897",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-14901",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-15030",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030",
"Impact": "Low",
"Public": "20190913"
},
{
"ID": "CVE-2019-15031",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-662",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15031",
"Impact": "Low",
"Public": "20190913"
},
{
"ID": "CVE-2019-15090",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090",
"Impact": "Low",
"Public": "20190816"
},
{
"ID": "CVE-2019-15098",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15098",
"Impact": "Low",
"Public": "20190816"
},
{
"ID": "CVE-2019-15099",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099",
"Impact": "High",
"Public": "20190816"
},
{
"ID": "CVE-2019-15117",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15117",
"Impact": "High",
"Public": "20190816"
},
{
"ID": "CVE-2019-15118",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15118",
"Impact": "Low",
"Public": "20190816"
},
{
"ID": "CVE-2019-15211",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15211",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15212",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15212",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15213",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15213",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15214",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15214",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15215",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15215",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15216",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15216",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15217",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15217",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15218",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15218",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15219",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15219",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15220",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15220",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15221",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15222",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15222",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15223",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15291",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15291",
"Impact": "Low",
"Public": "20190820"
},
{
"ID": "CVE-2019-15504",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15504",
"Impact": "Critical",
"Public": "20190823"
},
{
"ID": "CVE-2019-15505",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15505",
"Impact": "Critical",
"Public": "20190823"
},
{
"ID": "CVE-2019-15666",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15666",
"Impact": "Low",
"Public": "20190827"
},
{
"ID": "CVE-2019-15807",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15807",
"Impact": "Low",
"Public": "20190829"
},
{
"ID": "CVE-2019-15917",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
"Impact": "High",
"Public": "20190904"
},
{
"ID": "CVE-2019-15918",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15918",
"Impact": "High",
"Public": "20190904"
},
{
"ID": "CVE-2019-15919",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15919",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-15920",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15920",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-15921",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15921",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-15922",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15922",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-15923",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15923",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-15924",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15924",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-16089",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16089",
"Impact": "Low",
"Public": "20190906"
},
{
"ID": "CVE-2019-16413",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16413",
"Impact": "High",
"Public": "20190919"
},
{
"ID": "CVE-2019-16714",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16714",
"Impact": "High",
"Public": "20190923"
},
{
"ID": "CVE-2019-16746",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746",
"Impact": "Critical",
"Public": "20190924"
},
{
"ID": "CVE-2019-16994",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16994",
"Impact": "Low",
"Public": "20190930"
},
{
"ID": "CVE-2019-17052",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17052",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "CVE-2019-17053",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "CVE-2019-17054",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17054",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "CVE-2019-17055",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "CVE-2019-17056",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17056",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "CVE-2019-17075",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17075",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "CVE-2019-17133",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17133",
"Impact": "Critical",
"Public": "20191004"
},
{
"ID": "CVE-2019-17351",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17351",
"Impact": "Low",
"Public": "20191008"
},
{
"ID": "CVE-2019-17666",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666",
"Impact": "High",
"Public": "20191017"
},
{
"ID": "CVE-2019-18282",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282",
"Impact": "Low",
"Public": "20200116"
},
{
"ID": "CVE-2019-18660",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18660",
"Impact": "Low",
"Public": "20191127"
},
{
"ID": "CVE-2019-18683",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18683",
"Impact": "High",
"Public": "20191104"
},
{
"ID": "CVE-2019-18786",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18786",
"Impact": "Low",
"Public": "20191106"
},
{
"ID": "CVE-2019-18806",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18806",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18807",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18807",
"Impact": "High",
"Public": "20191107"
},
{
"ID": "CVE-2019-18808",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18809",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18811",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18813",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18813",
"Impact": "High",
"Public": "20191107"
},
{
"ID": "CVE-2019-18814",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18814",
"Impact": "Critical",
"Public": "20191107"
},
{
"ID": "CVE-2019-18885",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18885",
"Impact": "Low",
"Public": "20191114"
},
{
"ID": "CVE-2019-19036",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19036",
"Impact": "Low",
"Public": "20191121"
},
{
"ID": "CVE-2019-19037",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19037",
"Impact": "Low",
"Public": "20191121"
},
{
"ID": "CVE-2019-19039",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19039",
"Impact": "Low",
"Public": "20191121"
},
{
"ID": "CVE-2019-19043",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19043",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19045",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19046",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19047",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19048",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19048",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19049",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19049",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19051",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19051",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19052",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19052",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19054",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19054",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19055",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19056",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19057",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19058",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19059",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19060",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19060",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19061",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19061",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19062",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19063",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19064",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19064",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19065",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19066",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19066",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19067",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19068",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19070",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19070",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19071",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19071",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19072",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19073",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19074",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19075",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19075",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19076",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19076",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19077",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19078",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19078",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19079",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19079",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19080",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19080",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19081",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19081",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19082",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19082",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19083",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19083",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19227",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19227",
"Impact": "Low",
"Public": "20191122"
},
{
"ID": "CVE-2019-19241",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19241",
"Impact": "High",
"Public": "20191217"
},
{
"ID": "CVE-2019-19252",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19252",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-19332",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
"Impact": "Low",
"Public": "20200109"
},
{
"ID": "CVE-2019-19462",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19462",
"Impact": "Low",
"Public": "20191130"
},
{
"ID": "CVE-2019-19523",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19524",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19525",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19525",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19526",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19526",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19527",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19527",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19528",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19529",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19529",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19530",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19530",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19531",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19531",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19532",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19533",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19534",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19535",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19535",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19536",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19536",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19537",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19543",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
"Impact": "High",
"Public": "20191203"
},
{
"ID": "CVE-2019-19602",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
"Impact": "Low",
"Public": "20191205"
},
{
"ID": "CVE-2019-19767",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
"Impact": "Low",
"Public": "20191212"
},
{
"ID": "CVE-2019-19769",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19769",
"Impact": "Low",
"Public": "20191212"
},
{
"ID": "CVE-2019-19770",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
"Impact": "High",
"Public": "20191212"
},
{
"ID": "CVE-2019-19816",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19816",
"Impact": "High",
"Public": "20191217"
},
{
"ID": "CVE-2019-19922",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922",
"Impact": "Low",
"Public": "20191222"
},
{
"ID": "CVE-2019-19947",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19947",
"Impact": "Low",
"Public": "20191224"
},
{
"ID": "CVE-2019-19965",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19965",
"Impact": "Low",
"Public": "20191225"
},
{
"ID": "CVE-2019-19966",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19966",
"Impact": "Low",
"Public": "20191225"
},
{
"ID": "CVE-2019-20054",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
"Impact": "Low",
"Public": "20191228"
},
{
"ID": "CVE-2019-20095",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20095",
"Impact": "Low",
"Public": "20191230"
},
{
"ID": "CVE-2019-20096",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20096",
"Impact": "Low",
"Public": "20191230"
},
{
"ID": "CVE-2019-20422",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20422",
"Impact": "Low",
"Public": "20200127"
},
{
"ID": "CVE-2019-20636",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
"Impact": "Low",
"Public": "20200408"
},
{
"ID": "CVE-2019-20806",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20806",
"Impact": "Low",
"Public": "20200527"
},
{
"ID": "CVE-2019-20811",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20811",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2019-20812",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2019-20908",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20908",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2019-25045",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-25045",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2019-3459",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459",
"Impact": "Low",
"Public": "20190411"
},
{
"ID": "CVE-2019-3460",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460",
"Impact": "Low",
"Public": "20190411"
},
{
"ID": "CVE-2019-3900",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"Impact": "High",
"Public": "20190425"
},
{
"ID": "CVE-2019-5108",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108",
"Impact": "Low",
"Public": "20191223"
},
{
"ID": "CVE-2019-7221",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2019-7222",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Impact": "Low",
"Public": "20190321"
},
{
"ID": "CVE-2019-9857",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9857",
"Impact": "Low",
"Public": "20190321"
},
{
"ID": "CVE-2020-10720",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10720",
"Impact": "Low",
"Public": "20200903"
},
{
"ID": "CVE-2020-10732",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
"Impact": "Low",
"Public": "20200612"
},
{
"ID": "CVE-2020-11669",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11669",
"Impact": "Low",
"Public": "20200410"
},
{
"ID": "CVE-2020-12114",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114",
"Impact": "Low",
"Public": "20200504"
},
{
"ID": "CVE-2020-12652",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12652",
"Impact": "Low",
"Public": "20200505"
},
{
"ID": "CVE-2020-12769",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-662",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12769",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "CVE-2020-13974",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"Impact": "High",
"Public": "20200609"
},
{
"ID": "CVE-2020-14416",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14416",
"Impact": "Low",
"Public": "20200618"
},
{
"ID": "CVE-2020-25220",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25220",
"Impact": "High",
"Public": "20200910"
},
{
"ID": "CVE-2020-25673",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25673",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "CVE-2020-27786",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786",
"Impact": "High",
"Public": "20201211"
},
{
"ID": "CVE-2020-7053",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053",
"Impact": "High",
"Public": "20200114"
},
{
"ID": "CVE-2021-20177",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20177",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "CVE-2021-20317",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20317",
"Impact": "Low",
"Public": "20210927"
},
{
"ID": "CVE-2021-3715",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"Impact": "High",
"Public": "20220302"
},
{
"ID": "CVE-2023-0030",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0030",
"Impact": "High",
"Public": "20230308"
},
{
"ID": "CVE-2023-3022",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"Impact": "Low",
"Public": "20230619"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202433001",
"Comment": "kernel-doc-rpi is earlier than 1:5.4.51-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202433002",
"Comment": "kernel-headers-modules-rpi-def is earlier than 1:5.4.51-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202433003",
"Comment": "kernel-headers-rpi-def is earlier than 1:5.4.51-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202433004",
"Comment": "kernel-image-rpi-def is earlier than 1:5.4.51-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202433005",
"Comment": "kernel-modules-staging-rpi-def is earlier than 1:5.4.51-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202433006",
"Comment": "kernel-modules-v4l-rpi-def is earlier than 1:5.4.51-alt2"
}
]
}
]
}
}
]
}