{"cves":[{"cve_id":"CVE-2025-32463","summary":"Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.","cvss":9.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.3,"cvss_v4":null,"epss":0.38489,"ranking_epss":0.9725,"kev":true,"propose_action":"Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.","ransomware_campaign":"Unknown","references":["https://access.redhat.com/security/cve/cve-2025-32463","https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463","https://explore.alas.aws.amazon.com/CVE-2025-32463.html","https://security-tracker.debian.org/tracker/CVE-2025-32463","https://ubuntu.com/security/notices/USN-7604-1","https://www.openwall.com/lists/oss-security/2025/06/30/3","https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/","https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot","https://www.sudo.ws/releases/changelog/","https://www.sudo.ws/security/advisories/","https://www.sudo.ws/security/advisories/chroot_bug/","https://www.suse.com/security/cve/CVE-2025-32463.html","https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/","https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability","https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability","https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463"],"published_time":"2025-06-30T21:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32182","summary":"A Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux Enterprise Desktop 15 SP5 postfix, SUSE SUSE Linux Enterprise High Performance Computing 15 SP5 postfix, SUSE openSUSE Leap 15.5 postfix.This issue affects SUSE Linux Enterprise Desktop 15 SP5: before 3.7.3-150500.3.5.1; SUSE Linux Enterprise High Performance Computing 15 SP5: before 3.7.3-150500.3.5.1; openSUSE Leap 15.5 : before 3.7.3-150500.3.5.1.\n\n","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32182","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32182"],"published_time":"2023-09-19T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45153","summary":"An Incorrect Default Permissions vulnerability in saphanabootstrap-formula of SUSE Linux Enterprise Module for SAP Applications 15-SP1, SUSE Linux Enterprise Server for SAP 12-SP5; openSUSE Leap 15.4 allows local attackers to escalate to root by manipulating the sudo configuration that is created. This issue affects: SUSE Linux Enterprise Module for SAP Applications 15-SP1 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. SUSE Linux Enterprise Server for SAP 12-SP5 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. openSUSE Leap 15.4 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1205990","https://bugzilla.suse.com/show_bug.cgi?id=1205990"],"published_time":"2023-02-15T10:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-31254","summary":"A Incorrect Default Permissions vulnerability in rmt-server-regsharing service of SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.1; openSUSE Leap 15.3, openSUSE Leap 15.4 allows local attackers with access to the _rmt user to escalate to root. This issue affects: SUSE Linux Enterprise Server for SAP 15 rmt-server versions prior to 2.10. SUSE Linux Enterprise Server for SAP 15-SP1 rmt-server versions prior to 2.10. SUSE Manager Server 4.1 rmt-server versions prior to 2.10. openSUSE Leap 15.3 rmt-server versions prior to 2.10. openSUSE Leap 15.4 rmt-server versions prior to 2.10.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00046,"ranking_epss":0.13846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1204285","https://bugzilla.suse.com/show_bug.cgi?id=1204285"],"published_time":"2023-02-07T10:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22643","summary":"An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in libzypp-plugin-appdata of SUSE Linux Enterprise Server for SAP 15-SP3; openSUSE Leap 15.4 allows attackers that can trick users to use specially crafted REPO_ALIAS, REPO_TYPE or REPO_METADATA_PATH settings to execute code as root. This issue affects: SUSE Linux Enterprise Server for SAP 15-SP3 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426. openSUSE Leap 15.4 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00172,"ranking_epss":0.38449,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1206836","https://bugzilla.suse.com/show_bug.cgi?id=1206836"],"published_time":"2023-02-07T10:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-31252","summary":"A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location included in the path to a privileged binary to influence path resolution. This issue affects: SUSE Linux Enterprise Server 12-SP5 permissions versions prior to 20170707. openSUSE Leap 15.3 permissions versions prior to 20200127. openSUSE Leap 15.4 permissions versions prior to 20201225. openSUSE Leap Micro 5.2 permissions versions prior to 20181225.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00081,"ranking_epss":0.23863,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1203018","https://bugzilla.suse.com/show_bug.cgi?id=1203018"],"published_time":"2022-10-06T18:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-46141","summary":"An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30326,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/","https://github.com/uriparser/uriparser/issues/121","https://github.com/uriparser/uriparser/pull/124","https://lists.debian.org/debian-lts-announce/2022/01/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/","https://www.debian.org/security/2022/dsa-5063","https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/","https://github.com/uriparser/uriparser/issues/121","https://github.com/uriparser/uriparser/pull/124","https://lists.debian.org/debian-lts-announce/2022/01/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/","https://www.debian.org/security/2022/dsa-5063"],"published_time":"2022-01-06T04:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-46142","summary":"An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30326,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/","https://github.com/uriparser/uriparser/issues/122","https://github.com/uriparser/uriparser/pull/124","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/","https://www.debian.org/security/2022/dsa-5063","https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/","https://github.com/uriparser/uriparser/issues/122","https://github.com/uriparser/uriparser/pull/124","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/","https://www.debian.org/security/2022/dsa-5063"],"published_time":"2022-01-06T04:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41819","summary":"CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00755,"ranking_epss":0.73292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/910552","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20220121-0003/","https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/","https://hackerone.com/reports/910552","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20220121-0003/","https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/"],"published_time":"2022-01-01T06:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41817","summary":"Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.6581,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1254844","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/","https://security.gentoo.org/glsa/202401-27","https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/","https://hackerone.com/reports/1254844","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/","https://security.gentoo.org/glsa/202401-27","https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/"],"published_time":"2022-01-01T05:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-25321","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.0857,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1186240","https://bugzilla.suse.com/show_bug.cgi?id=1186240"],"published_time":"2021-06-30T09:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-25322","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in python-HyperKitty of openSUSE Leap 15.2, Factory allows local attackers to escalate privileges from the user hyperkitty or hyperkitty-admin to root. This issue affects: openSUSE Leap 15.2 python-HyperKitty version 1.3.2-lp152.2.3.1 and prior versions. openSUSE Factory python-HyperKitty versions prior to 1.3.4-5.1.","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10306,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1182373","https://bugzilla.suse.com/show_bug.cgi?id=1182373"],"published_time":"2021-06-10T12:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31997","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in python-postorius of openSUSE Leap 15.2, Factory allows local attackers to escalate from users postorius or postorius-admin to root. This issue affects: openSUSE Leap 15.2 python-postorius version 1.3.2-lp152.1.2 and prior versions. openSUSE Factory python-postorius version 1.3.4-2.1 and prior versions.","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10306,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1182407","https://bugzilla.suse.com/show_bug.cgi?id=1182407"],"published_time":"2021-06-10T12:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31998","summary":"A Incorrect Default Permissions vulnerability in the packaging of inn of SUSE Linux Enterprise Server 11-SP3; openSUSE Backports SLE-15-SP2, openSUSE Leap 15.2 allows local attackers to escalate their privileges from the news user to root. This issue affects: SUSE Linux Enterprise Server 11-SP3 inn version inn-2.4.2-170.21.3.1 and prior versions. openSUSE Backports SLE-15-SP2 inn versions prior to 2.6.2. openSUSE Leap 15.2 inn versions prior to 2.6.2.","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08023,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1182321","https://bugzilla.suse.com/show_bug.cgi?id=1182321"],"published_time":"2021-06-10T12:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-25317","summary":"A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.","cvss":3.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.3,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27614,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1184161","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWPGZLT3U776Q5YPPSA6LGFWWBDWBVH3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H74BP746O5NNVCBUTLLZYAFBPESFVECV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S37IDQGHTORQ3Z6VRDQIGBYVOI27YG47/","https://bugzilla.suse.com/show_bug.cgi?id=1184161","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWPGZLT3U776Q5YPPSA6LGFWWBDWBVH3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H74BP746O5NNVCBUTLLZYAFBPESFVECV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S37IDQGHTORQ3Z6VRDQIGBYVOI27YG47/"],"published_time":"2021-05-05T10:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8027","summary":"A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to overwrite arbitrary files and gain access to the openldap2 configuration This issue affects: SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.37.1. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.37.1. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.18.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.9.1.","cvss":7.3,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12262,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1175568","https://bugzilla.suse.com/show_bug.cgi?id=1175568"],"published_time":"2021-02-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26675","summary":"A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.","cvss":8.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00186,"ranking_epss":0.40393,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1181751","https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb","https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog","https://kunnamon.io/tbone/","https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html","https://security.gentoo.org/glsa/202107-29","https://www.debian.org/security/2021/dsa-4847","https://www.openwall.com/lists/oss-security/2021/02/08/2","https://bugzilla.suse.com/show_bug.cgi?id=1181751","https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb","https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog","https://kunnamon.io/tbone/","https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html","https://security.gentoo.org/glsa/202107-29","https://www.debian.org/security/2021/dsa-4847","https://www.openwall.com/lists/oss-security/2021/02/08/2"],"published_time":"2021-02-09T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26676","summary":"gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.","cvss":6.5,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00096,"ranking_epss":0.26465,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1181751","https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa","https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1","https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog","https://kunnamon.io/tbone/","https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html","https://security.gentoo.org/glsa/202107-29","https://www.debian.org/security/2021/dsa-4847","https://www.openwall.com/lists/oss-security/2021/02/08/2","https://bugzilla.suse.com/show_bug.cgi?id=1181751","https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa","https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1","https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog","https://kunnamon.io/tbone/","https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html","https://security.gentoo.org/glsa/202107-29","https://www.debian.org/security/2021/dsa-4847","https://www.openwall.com/lists/oss-security/2021/02/08/2"],"published_time":"2021-02-09T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0569","summary":"Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.","cvss":5.7,"cvss_version":3.0,"cvss_v2":2.7,"cvss_v3":5.7,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56054,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"],"published_time":"2020-11-23T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16846","summary":"An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.94387,"ranking_epss":0.99972,"kev":true,"propose_action":"SaltStack Salt allows an unauthenticated user with network access to the Salt API to use shell injections to run code on the Salt API using the SSH client. This vulnerability affects any users running the Salt API.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html","http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html","https://github.com/saltstack/salt/releases","https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html","https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/","https://security.gentoo.org/glsa/202011-13","https://www.debian.org/security/2021/dsa-4837","https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/","https://www.zerodayinitiative.com/advisories/ZDI-20-1379/","https://www.zerodayinitiative.com/advisories/ZDI-20-1380/","https://www.zerodayinitiative.com/advisories/ZDI-20-1381/","https://www.zerodayinitiative.com/advisories/ZDI-20-1382/","https://www.zerodayinitiative.com/advisories/ZDI-20-1383/","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html","http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html","https://github.com/saltstack/salt/releases","https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html","https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/","https://security.gentoo.org/glsa/202011-13","https://www.debian.org/security/2021/dsa-4837","https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/","https://www.zerodayinitiative.com/advisories/ZDI-20-1379/","https://www.zerodayinitiative.com/advisories/ZDI-20-1380/","https://www.zerodayinitiative.com/advisories/ZDI-20-1381/","https://www.zerodayinitiative.com/advisories/ZDI-20-1382/","https://www.zerodayinitiative.com/advisories/ZDI-20-1383/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-16846"],"published_time":"2020-11-06T08:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-28049","summary":"An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.","cvss":6.3,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10999,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00031.html","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-28049","https://github.com/sddm/sddm/blob/v0.19.0/ChangeLog","https://github.com/sddm/sddm/releases","https://lists.debian.org/debian-lts-announce/2020/11/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GT3EX5NSQJJAKY63ENSMEDX6NYZLYY3S/","https://security.gentoo.org/glsa/202402-02","https://www.debian.org/security/2020/dsa-4783","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00031.html","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-28049","https://github.com/sddm/sddm/blob/v0.19.0/ChangeLog","https://github.com/sddm/sddm/releases","https://lists.debian.org/debian-lts-announce/2020/11/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GT3EX5NSQJJAKY63ENSMEDX6NYZLYY3S/","https://security.gentoo.org/glsa/202402-02","https://www.debian.org/security/2020/dsa-4783"],"published_time":"2020-11-04T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16004","summary":"Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01365,"ranking_epss":0.80215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1138911","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1138911","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16005","summary":"Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01365,"ranking_epss":0.80215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1139398","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1139398","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16006","summary":"Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01365,"ranking_epss":0.80215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1133527","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1133527","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16007","summary":"Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1125018","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1125018","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16008","summary":"Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01269,"ranking_epss":0.79504,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1134107","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1134107","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16009","summary":"Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.84383,"ranking_epss":0.99326,"kev":true,"propose_action":"Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1143772","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1143772","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/","https://security.gentoo.org/glsa/202011-12","https://www.debian.org/security/2021/dsa-4824","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-16009"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16011","summary":"Heap buffer overflow in UI in Google Chrome on Windows prior to 86.0.4240.183 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.01598,"ranking_epss":0.81722,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1144489","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html","http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html","https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html","https://crbug.com/1144489","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-11-03T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14323","summary":"A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00421,"ranking_epss":0.62088,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html","https://bugzilla.redhat.com/show_bug.cgi?id=1891685","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/","https://security.gentoo.org/glsa/202012-24","https://security.netapp.com/advisory/ntap-20201103-0001/","https://www.samba.org/samba/security/CVE-2020-14323.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html","https://bugzilla.redhat.com/show_bug.cgi?id=1891685","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/","https://security.gentoo.org/glsa/202012-24","https://security.netapp.com/advisory/ntap-20201103-0001/","https://www.samba.org/samba/security/CVE-2020-14323.html"],"published_time":"2020-10-29T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-27673","summary":"An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.103,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/6","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070","https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070","https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html","https://security.gentoo.org/glsa/202011-06","https://xenbits.xen.org/xsa/advisory-332.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/6","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070","https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070","https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html","https://security.gentoo.org/glsa/202011-06","https://xenbits.xen.org/xsa/advisory-332.html"],"published_time":"2020-10-22T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15683","summary":"Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01566,"ranking_epss":0.81545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140","https://lists.debian.org/debian-lts-announce/2020/10/msg00027.html","https://security.gentoo.org/glsa/202010-08","https://www.debian.org/security/2020/dsa-4780","https://www.mozilla.org/security/advisories/mfsa2020-45/","https://www.mozilla.org/security/advisories/mfsa2020-46/","https://www.mozilla.org/security/advisories/mfsa2020-47/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140","https://lists.debian.org/debian-lts-announce/2020/10/msg00027.html","https://security.gentoo.org/glsa/202010-08","https://www.debian.org/security/2020/dsa-4780","https://www.mozilla.org/security/advisories/mfsa2020-45/","https://www.mozilla.org/security/advisories/mfsa2020-46/","https://www.mozilla.org/security/advisories/mfsa2020-47/"],"published_time":"2020-10-22T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-27670","summary":"An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/9","http://xenbits.xen.org/xsa/advisory-347.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4804","https://xenbits.xen.org/xsa/advisory-347.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/9","http://xenbits.xen.org/xsa/advisory-347.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4804","https://xenbits.xen.org/xsa/advisory-347.html"],"published_time":"2020-10-22T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-27671","summary":"An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21828,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/8","http://xenbits.xen.org/xsa/advisory-346.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4804","https://xenbits.xen.org/xsa/advisory-346.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/8","http://xenbits.xen.org/xsa/advisory-346.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4804","https://xenbits.xen.org/xsa/advisory-346.html"],"published_time":"2020-10-22T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-27672","summary":"An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11582,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/7","http://xenbits.xen.org/xsa/advisory-345.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4804","https://xenbits.xen.org/xsa/advisory-345.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html","http://www.openwall.com/lists/oss-security/2021/01/19/7","http://xenbits.xen.org/xsa/advisory-345.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4804","https://xenbits.xen.org/xsa/advisory-345.html"],"published_time":"2020-10-22T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-27560","summary":"ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service.","cvss":3.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32146,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html","https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4","https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html","https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html","https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4","https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html","https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"],"published_time":"2020-10-22T14:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14803","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14792","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).","cvss":4.2,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00186,"ranking_epss":0.40458,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14796","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).","cvss":3.1,"cvss_version":3.0,"cvss_v2":2.6,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00132,"ranking_epss":0.32758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14797","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35723,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14798","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).","cvss":3.1,"cvss_version":3.0,"cvss_v2":2.6,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00244,"ranking_epss":0.47682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14779","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.002,"ranking_epss":0.42116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14781","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14782","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20201023-0004/","https://www.debian.org/security/2020/dsa-4779","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-10-21T15:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25829","summary":"An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00348,"ranking_epss":0.57419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html","https://security.gentoo.org/glsa/202012-19","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html","https://security.gentoo.org/glsa/202012-19"],"published_time":"2020-10-16T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-27153","summary":"In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.","cvss":8.6,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.6,"cvss_v4":null,"epss":0.01899,"ranking_epss":0.83263,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00036.html","https://bugzilla.redhat.com/show_bug.cgi?id=1884817","https://github.com/bluez/bluez/commit/1cd644db8c23a2f530ddb93cebed7dacc5f5721a","https://github.com/bluez/bluez/commit/5a180f2ec9edfacafd95e5fed20d36fe8e077f07","https://lists.debian.org/debian-lts-announce/2020/10/msg00022.html","https://security.gentoo.org/glsa/202011-01","https://www.debian.org/security/2021/dsa-4951","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00036.html","https://bugzilla.redhat.com/show_bug.cgi?id=1884817","https://github.com/bluez/bluez/commit/1cd644db8c23a2f530ddb93cebed7dacc5f5721a","https://github.com/bluez/bluez/commit/5a180f2ec9edfacafd95e5fed20d36fe8e077f07","https://lists.debian.org/debian-lts-announce/2020/10/msg00022.html","https://security.gentoo.org/glsa/202011-01","https://www.debian.org/security/2021/dsa-4951"],"published_time":"2020-10-15T03:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15229","summary":"Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that.","cvss":8.2,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00876,"ranking_epss":0.75343,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html","https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes","https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e","https://github.com/hpcng/singularity/pull/5611","https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html","https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes","https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e","https://github.com/hpcng/singularity/pull/5611","https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9"],"published_time":"2020-10-14T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25645","summary":"A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00393,"ranking_epss":0.60284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html","https://bugzilla.redhat.com/show_bug.cgi?id=1883988","https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html","https://security.netapp.com/advisory/ntap-20201103-0004/","https://www.debian.org/security/2020/dsa-4774","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html","https://bugzilla.redhat.com/show_bug.cgi?id=1883988","https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html","https://security.netapp.com/advisory/ntap-20201103-0004/","https://www.debian.org/security/2020/dsa-4774"],"published_time":"2020-10-13T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26934","summary":"phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.02788,"ranking_epss":0.86101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHST4E5IJG7IKZTTW3R6MEZPVHJZ472K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXK37YEHSDYCIPQSYEMN2OFTP2ZLM7DO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNLGHVDNAEZEGRTUESSSQFM7MZTHIDQ5/","https://security.gentoo.org/glsa/202101-35","https://www.phpmyadmin.net/security/PMASA-2020-5/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHST4E5IJG7IKZTTW3R6MEZPVHJZ472K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXK37YEHSDYCIPQSYEMN2OFTP2ZLM7DO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNLGHVDNAEZEGRTUESSSQFM7MZTHIDQ5/","https://security.gentoo.org/glsa/202101-35","https://www.phpmyadmin.net/security/PMASA-2020-5/"],"published_time":"2020-10-10T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26935","summary":"An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.91523,"ranking_epss":0.99673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://advisory.checkmarx.net/advisory/CX-2020-4281","https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHST4E5IJG7IKZTTW3R6MEZPVHJZ472K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXK37YEHSDYCIPQSYEMN2OFTP2ZLM7DO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNLGHVDNAEZEGRTUESSSQFM7MZTHIDQ5/","https://security.gentoo.org/glsa/202101-35","https://www.phpmyadmin.net/security/PMASA-2020-6/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://advisory.checkmarx.net/advisory/CX-2020-4281","https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHST4E5IJG7IKZTTW3R6MEZPVHJZ472K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXK37YEHSDYCIPQSYEMN2OFTP2ZLM7DO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNLGHVDNAEZEGRTUESSSQFM7MZTHIDQ5/","https://security.gentoo.org/glsa/202101-35","https://www.phpmyadmin.net/security/PMASA-2020-6/"],"published_time":"2020-10-10T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26164","summary":"In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26411,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00018.html","http://www.openwall.com/lists/oss-security/2020/10/13/4","http://www.openwall.com/lists/oss-security/2020/10/13/5","http://www.openwall.com/lists/oss-security/2020/10/14/1","http://www.openwall.com/lists/oss-security/2020/11/30/1","https://bugzilla.suse.com/show_bug.cgi?id=1176268","https://github.com/KDE/kdeconnect-kde/commit/024e5f23db8d8ad3449714b906b46094baaffb89","https://github.com/KDE/kdeconnect-kde/commit/4fbd01a3d44a0bcca888c49a77ec7cfd10e113d7","https://github.com/KDE/kdeconnect-kde/commit/542d94a70c56aa386c8d4d793481ce181b0422e8","https://github.com/KDE/kdeconnect-kde/commit/613899be24b6e2a6b3e5cc719efce8ae8a122991","https://github.com/KDE/kdeconnect-kde/commit/8112729eb0f13e6947984416118531078e65580d","https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59","https://github.com/KDE/kdeconnect-kde/releases","https://kde.org/info/security/advisory-20201002-1.txt","https://kdeconnect.kde.org/official/","https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00014.html","https://security.gentoo.org/glsa/202101-16","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00018.html","http://www.openwall.com/lists/oss-security/2020/10/13/4","http://www.openwall.com/lists/oss-security/2020/10/13/5","http://www.openwall.com/lists/oss-security/2020/10/14/1","http://www.openwall.com/lists/oss-security/2020/11/30/1","https://bugzilla.suse.com/show_bug.cgi?id=1176268","https://github.com/KDE/kdeconnect-kde/commit/024e5f23db8d8ad3449714b906b46094baaffb89","https://github.com/KDE/kdeconnect-kde/commit/4fbd01a3d44a0bcca888c49a77ec7cfd10e113d7","https://github.com/KDE/kdeconnect-kde/commit/542d94a70c56aa386c8d4d793481ce181b0422e8","https://github.com/KDE/kdeconnect-kde/commit/613899be24b6e2a6b3e5cc719efce8ae8a122991","https://github.com/KDE/kdeconnect-kde/commit/8112729eb0f13e6947984416118531078e65580d","https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59","https://github.com/KDE/kdeconnect-kde/releases","https://kde.org/info/security/advisory-20201002-1.txt","https://kdeconnect.kde.org/official/","https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00014.html","https://security.gentoo.org/glsa/202101-16"],"published_time":"2020-10-07T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11800","summary":"Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.","cvss":9.0,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.0,"cvss_v4":null,"epss":0.47753,"ranking_epss":0.97718,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html","https://support.zabbix.com/browse/DEV-1538","https://support.zabbix.com/browse/ZBX-17600","https://support.zabbix.com/browse/ZBXSEC-30","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html","https://support.zabbix.com/browse/DEV-1538","https://support.zabbix.com/browse/ZBX-17600","https://support.zabbix.com/browse/ZBXSEC-30"],"published_time":"2020-10-07T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14355","summary":"Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.","cvss":6.6,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":6.6,"cvss_v4":null,"epss":0.01111,"ranking_epss":0.78176,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html","https://bugzilla.redhat.com/show_bug.cgi?id=1868435","https://lists.debian.org/debian-lts-announce/2020/11/msg00001.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00002.html","https://usn.ubuntu.com/4572-1/","https://usn.ubuntu.com/4572-2/","https://www.debian.org/security/2020/dsa-4771","https://www.openwall.com/lists/oss-security/2020/10/06/10","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html","https://bugzilla.redhat.com/show_bug.cgi?id=1868435","https://lists.debian.org/debian-lts-announce/2020/11/msg00001.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00002.html","https://usn.ubuntu.com/4572-1/","https://usn.ubuntu.com/4572-2/","https://www.debian.org/security/2020/dsa-4771","https://www.openwall.com/lists/oss-security/2020/10/06/10"],"published_time":"2020-10-07T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25862","summary":"In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00297,"ranking_epss":0.53092,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753","https://gitlab.com/wireshark/wireshark/-/issues/16816","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-12.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753","https://gitlab.com/wireshark/wireshark/-/issues/16816","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-12.html"],"published_time":"2020-10-06T15:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25863","summary":"In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00181,"ranking_epss":0.39751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482","https://gitlab.com/wireshark/wireshark/-/issues/16741","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-11.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482","https://gitlab.com/wireshark/wireshark/-/issues/16741","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-11.html"],"published_time":"2020-10-06T15:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25866","summary":"In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01315,"ranking_epss":0.7987,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f","https://gitlab.com/wireshark/wireshark/-/issues/16866","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-13.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f","https://gitlab.com/wireshark/wireshark/-/issues/16866","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-13.html"],"published_time":"2020-10-06T15:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25637","summary":"A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","cvss":6.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.3141,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html","https://bugzilla.redhat.com/show_bug.cgi?id=1881037","https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html","https://security.gentoo.org/glsa/202210-06","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html","https://bugzilla.redhat.com/show_bug.cgi?id=1881037","https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html","https://security.gentoo.org/glsa/202210-06"],"published_time":"2020-10-06T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25641","summary":"A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.05142,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","http://www.openwall.com/lists/oss-security/2020/10/06/9","https://bugzilla.redhat.com/show_bug.cgi?id=1881424","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://usn.ubuntu.com/4576-1/","https://www.kernel.org/doc/html/latest/block/biovecs.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","http://www.openwall.com/lists/oss-security/2020/10/06/9","https://bugzilla.redhat.com/show_bug.cgi?id=1881424","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://usn.ubuntu.com/4576-1/","https://www.kernel.org/doc/html/latest/block/biovecs.html"],"published_time":"2020-10-06T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25643","summary":"A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","cvss":7.2,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.46353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","https://bugzilla.redhat.com/show_bug.cgi?id=1879981","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105","https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://security.netapp.com/advisory/ntap-20201103-0002/","https://www.debian.org/security/2020/dsa-4774","https://www.starwindsoftware.com/security/sw-20210325-0002/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","https://bugzilla.redhat.com/show_bug.cgi?id=1879981","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105","https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://security.netapp.com/advisory/ntap-20201103-0002/","https://www.debian.org/security/2020/dsa-4774","https://www.starwindsoftware.com/security/sw-20210325-0002/"],"published_time":"2020-10-06T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8228","summary":"A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00451,"ranking_epss":0.63738,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html","https://hackerone.com/reports/922470","https://nextcloud.com/security/advisory/?id=NC-SA-2020-033","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html","https://hackerone.com/reports/922470","https://nextcloud.com/security/advisory/?id=NC-SA-2020-033"],"published_time":"2020-10-05T14:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7069","summary":"In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.","cvss":5.4,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":5.4,"cvss_v4":null,"epss":0.08351,"ranking_epss":0.92307,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html","https://bugs.php.net/bug.php?id=79601","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/","https://security.gentoo.org/glsa/202012-16","https://security.netapp.com/advisory/ntap-20201016-0001/","https://usn.ubuntu.com/4583-1/","https://www.debian.org/security/2021/dsa-4856","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html","https://bugs.php.net/bug.php?id=79601","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/","https://security.gentoo.org/glsa/202012-16","https://security.netapp.com/advisory/ntap-20201016-0001/","https://usn.ubuntu.com/4583-1/","https://www.debian.org/security/2021/dsa-4856","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-10-02T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7070","summary":"In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.","cvss":4.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":4.3,"cvss_v4":null,"epss":0.26088,"ranking_epss":0.96298,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://cve.circl.lu/cve/CVE-2020-8184","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html","https://bugs.php.net/bug.php?id=79699","https://hackerone.com/reports/895727","https://lists.debian.org/debian-lts-announce/2020/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/","https://security.gentoo.org/glsa/202012-16","https://security.netapp.com/advisory/ntap-20201016-0001/","https://usn.ubuntu.com/4583-1/","https://www.debian.org/security/2021/dsa-4856","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.tenable.com/security/tns-2021-14","http://cve.circl.lu/cve/CVE-2020-8184","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html","https://bugs.php.net/bug.php?id=79699","https://hackerone.com/reports/895727","https://lists.debian.org/debian-lts-announce/2020/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/","https://security.gentoo.org/glsa/202012-16","https://security.netapp.com/advisory/ntap-20201016-0001/","https://usn.ubuntu.com/4583-1/","https://www.debian.org/security/2021/dsa-4856","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-10-02T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15673","summary":"Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00869,"ranking_epss":0.7522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1648493%2C1660800","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1648493%2C1660800","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/"],"published_time":"2020-10-01T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15676","summary":"Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00808,"ranking_epss":0.74236,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1646140","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1646140","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/"],"published_time":"2020-10-01T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15677","summary":"By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.","cvss":6.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00527,"ranking_epss":0.67111,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1641487","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1641487","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/"],"published_time":"2020-10-01T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15678","summary":"When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00869,"ranking_epss":0.7522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1660211","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1660211","https://lists.debian.org/debian-lts-announce/2020/10/msg00020.html","https://security.gentoo.org/glsa/202010-02","https://www.debian.org/security/2020/dsa-4770","https://www.mozilla.org/security/advisories/mfsa2020-42/","https://www.mozilla.org/security/advisories/mfsa2020-43/","https://www.mozilla.org/security/advisories/mfsa2020-44/"],"published_time":"2020-10-01T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14374","summary":"A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00159,"ranking_epss":0.36729,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879466","https://www.openwall.com/lists/oss-security/2020/09/28/3","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879466","https://www.openwall.com/lists/oss-security/2020/09/28/3"],"published_time":"2020-09-30T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14375","summary":"A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879468","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879468","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3"],"published_time":"2020-09-30T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14376","summary":"A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24856,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879470","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879470","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3"],"published_time":"2020-09-30T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14377","summary":"A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.19776,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879472","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879472","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3"],"published_time":"2020-09-30T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14378","summary":"An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.","cvss":3.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22567,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879473","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html","http://www.openwall.com/lists/oss-security/2021/01/04/1","http://www.openwall.com/lists/oss-security/2021/01/04/2","http://www.openwall.com/lists/oss-security/2021/01/04/5","https://bugzilla.redhat.com/show_bug.cgi?id=1879473","https://usn.ubuntu.com/4550-1/","https://www.openwall.com/lists/oss-security/2020/09/28/3"],"published_time":"2020-09-30T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26154","summary":"url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.","cvss":9.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00717,"ranking_epss":0.72433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html","https://bugs.debian.org/968366","https://github.com/libproxy/libproxy/pull/126","https://lists.debian.org/debian-lts-announce/2020/11/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZVZXTFMFTSML3J6OOCDBDYH474BRJSW/","https://www.debian.org/security/2020/dsa-4800","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html","https://bugs.debian.org/968366","https://github.com/libproxy/libproxy/pull/126","https://lists.debian.org/debian-lts-announce/2020/11/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BID3HVHAF6DA3YJOFDBSAZSMR3ODNIW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZVZXTFMFTSML3J6OOCDBDYH474BRJSW/","https://www.debian.org/security/2020/dsa-4800"],"published_time":"2020-09-30T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26116","summary":"http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.","cvss":7.2,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":7.2,"cvss_v4":null,"epss":0.01017,"ranking_epss":0.77222,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html","https://bugs.python.org/issue39603","https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/","https://python-security.readthedocs.io/vuln/http-header-injection-method.html","https://security.gentoo.org/glsa/202101-18","https://security.netapp.com/advisory/ntap-20201023-0001/","https://usn.ubuntu.com/4581-1/","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html","https://bugs.python.org/issue39603","https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/","https://python-security.readthedocs.io/vuln/http-header-injection-method.html","https://security.gentoo.org/glsa/202101-18","https://security.netapp.com/advisory/ntap-20201023-0001/","https://usn.ubuntu.com/4581-1/","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-09-27T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26117","summary":"In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0069,"ranking_epss":0.71826,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00024.html","https://bugzilla.opensuse.org/show_bug.cgi?id=1176733","https://github.com/TigerVNC/tigervnc/commit/20dea801e747318525a5859fe4f37c52b05310cb","https://github.com/TigerVNC/tigervnc/commit/7399eab79a4365434d26494fa1628ce1eb91562b","https://github.com/TigerVNC/tigervnc/commit/b30f10c681ec87720cff85d490f67098568a9cba","https://github.com/TigerVNC/tigervnc/commit/f029745f63ac7d22fb91639b2cb5b3ab56134d6e","https://github.com/TigerVNC/tigervnc/releases/tag/v1.11.0","https://lists.debian.org/debian-lts-announce/2020/10/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00024.html","https://bugzilla.opensuse.org/show_bug.cgi?id=1176733","https://github.com/TigerVNC/tigervnc/commit/20dea801e747318525a5859fe4f37c52b05310cb","https://github.com/TigerVNC/tigervnc/commit/7399eab79a4365434d26494fa1628ce1eb91562b","https://github.com/TigerVNC/tigervnc/commit/b30f10c681ec87720cff85d490f67098568a9cba","https://github.com/TigerVNC/tigervnc/commit/f029745f63ac7d22fb91639b2cb5b3ab56134d6e","https://github.com/TigerVNC/tigervnc/releases/tag/v1.11.0","https://lists.debian.org/debian-lts-announce/2020/10/msg00007.html"],"published_time":"2020-09-27T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15208","summary":"In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. The issue is patched in commit 8ee24e7949a203d234489f9da2c5bf45a7d5157d, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":7.4,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.4,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v"],"published_time":"2020-09-25T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15209","summary":"In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00357,"ranking_epss":0.58013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm"],"published_time":"2020-09-25T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15210","summary":"In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":6.5,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00329,"ranking_epss":0.55976,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2"],"published_time":"2020-09-25T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15211","summary":"In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors. This results in special casing during validation at model loading time. Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. The issue is patched in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83), and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code.","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00344,"ranking_epss":0.57025,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0","https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35","https://github.com/tensorflow/tensorflow/commit/46d5b0852528ddfd614ded79bccc75589f801bd9","https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f","https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162","https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0","https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35","https://github.com/tensorflow/tensorflow/commit/46d5b0852528ddfd614ded79bccc75589f801bd9","https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f","https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162","https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45"],"published_time":"2020-09-25T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15202","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments. However, there are several places in TensorFlow where a lambda taking `int` or `int32` arguments is being used. In these cases, if the amount of work to be parallelized is large enough, integer truncation occurs. Depending on how the two arguments of the lambda are used, this can result in segfaults, read/write outside of heap allocated arrays, stack overflows, or data corruption. The issue is patched in commits 27b417360cbd671ef55915e4bb6bb06af8b8a832 and ca8c013b5e97b1373b3bb1c97ea655e69f31a575, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":9.0,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00502,"ranking_epss":0.66089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832","https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6fg-mjxg-hqq4","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832","https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6fg-mjxg-hqq4"],"published_time":"2020-09-25T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15203","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0036,"ranking_epss":0.58218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79"],"published_time":"2020-09-25T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15204","summary":"In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault. The issue is patched in commit 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00221,"ranking_epss":0.44746,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8"],"published_time":"2020-09-25T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15205","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` argument of `tf.raw_ops.StringNGrams` lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory In the linked code snippet, all the binary strings after `ee ff` are contents from the memory stack. Since these can contain return addresses, this data leak can be used to defeat ASLR. The issue is patched in commit 0462de5b544ed4731aa2fb23946ac22c01856b80, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":9.0,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00544,"ranking_epss":0.67815,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/0462de5b544ed4731aa2fb23946ac22c01856b80","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g7p5-5759-qv46","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/0462de5b544ed4731aa2fb23946ac22c01856b80","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g7p5-5759-qv46"],"published_time":"2020-09-25T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15206","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":9.0,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00472,"ranking_epss":0.64719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g"],"published_time":"2020-09-25T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15207","summary":"In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. The issue is patched in commit 2d88f470dea2671b430884260f3626b1fe99830a, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":8.7,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.7,"cvss_v4":null,"epss":0.01411,"ranking_epss":0.80532,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34"],"published_time":"2020-09-25T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15190","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Switch` operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output. Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault The issue is patched in commit da8558533d925694483d2c136a9220d6d49d843c, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00189,"ranking_epss":0.40721,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4"],"published_time":"2020-09-25T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15191","summary":"In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these methods will bind references to null pointers. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00246,"ranking_epss":0.47945,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr"],"published_time":"2020-09-25T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15192","summary":"In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure. The issue occurs because the `status` argument during validation failures is not properly checked. Since each of the above methods can return an error status, the `status` value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00226,"ranking_epss":0.45411,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv"],"published_time":"2020-09-25T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15193","summary":"In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing in a Python object instead of a tensor. The uninitialized memory address is due to a `reinterpret_cast` Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.","cvss":7.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00215,"ranking_epss":0.44051,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v"],"published_time":"2020-09-25T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15194","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments. Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.\"","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0022,"ranking_epss":0.44675,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382"],"published_time":"2020-09-25T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15195","summary":"In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern. It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.","cvss":8.5,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.5,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57843,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html","https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54","https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1","https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr"],"published_time":"2020-09-25T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11556","summary":"Pagure before 5.6 allows XSS via the templates/blame.html blame view.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00587,"ranking_epss":0.69145,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html","https://docs.pagure.org/pagure/changelog.html","https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618","https://pagure.io/pagure/commits/master","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html","https://docs.pagure.org/pagure/changelog.html","https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618","https://pagure.io/pagure/commits/master"],"published_time":"2020-09-25T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-26088","summary":"A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2","https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://usn.ubuntu.com/4578-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2","https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://usn.ubuntu.com/4578-1/"],"published_time":"2020-09-24T15:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25596","summary":"An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-339.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-339.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25598","summary":"An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don't use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2216,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://xenbits.xen.org/xsa/advisory-334.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://xenbits.xen.org/xsa/advisory-334.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25599","summary":"An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22375,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","http://www.openwall.com/lists/oss-security/2020/12/16/5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-343.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","http://www.openwall.com/lists/oss-security/2020/12/16/5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-343.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25600","summary":"An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn't get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27697,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-342.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-342.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25601","summary":"An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-344.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-344.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25602","summary":"An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.","cvss":6.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00081,"ranking_epss":0.23842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-333.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-333.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25603","summary":"An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.21956,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-340.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-340.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25604","summary":"An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn't acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.","cvss":4.7,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21823,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-336.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-336.html"],"published_time":"2020-09-23T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25595","summary":"An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it's better to assume that it does.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.1,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25091,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-337.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/","https://security.gentoo.org/glsa/202011-06","https://www.debian.org/security/2020/dsa-4769","https://xenbits.xen.org/xsa/advisory-337.html"],"published_time":"2020-09-23T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6564","summary":"Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00662,"ranking_epss":0.71202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/841622","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/841622","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6565","summary":"Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00864,"ranking_epss":0.75128,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1029907","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1029907","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6566","summary":"Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00889,"ranking_epss":0.75564,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1065264","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1065264","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6567","summary":"Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0053,"ranking_epss":0.6727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/937179","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/937179","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6568","summary":"Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0053,"ranking_epss":0.6727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1092451","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1092451","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6569","summary":"Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.","cvss":6.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.3,"cvss_v4":null,"epss":0.01169,"ranking_epss":0.78673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/995732","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/995732","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6570","summary":"Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00912,"ranking_epss":0.75897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1084699","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1084699","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6571","summary":"Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00959,"ranking_epss":0.76502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1085315","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1085315","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6573","summary":"Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.02277,"ranking_epss":0.8469,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1116304","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1116304","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6574","summary":"Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1102196","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1102196","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6575","summary":"Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.","cvss":8.3,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.3,"cvss_v4":null,"epss":0.02552,"ranking_epss":0.85522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1081874","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1081874","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6576","summary":"Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02277,"ranking_epss":0.8469,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1111737","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1111737","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6556","summary":"Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0188,"ranking_epss":0.83183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html","https://crbug.com/1115345","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html","https://crbug.com/1115345","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6558","summary":"Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00523,"ranking_epss":0.66946,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1109120","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1109120","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6559","summary":"Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05648,"ranking_epss":0.90372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1116706","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1116706","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6560","summary":"Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00818,"ranking_epss":0.74404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1108181","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1108181","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6561","summary":"Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00987,"ranking_epss":0.76891,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/932892","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/932892","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6562","summary":"Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00707,"ranking_epss":0.7222,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1086845","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1086845","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6563","summary":"Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00818,"ranking_epss":0.74404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1104628","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html","https://crbug.com/1104628","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15965","summary":"Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13584,"ranking_epss":0.94255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1126249","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1126249","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15966","summary":"Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00883,"ranking_epss":0.75447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1113565","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1113565","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15959","summary":"Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00883,"ranking_epss":0.75447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1122684","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html","https://crbug.com/1122684","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15960","summary":"Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02264,"ranking_epss":0.84649,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1100136","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1100136","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15961","summary":"Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.01352,"ranking_epss":0.80135,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1114636","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1114636","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15962","summary":"Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03112,"ranking_epss":0.86846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1121836","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1121836","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15963","summary":"Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.01352,"ranking_epss":0.80135,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1113558","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1113558","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15964","summary":"Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02266,"ranking_epss":0.84655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1121414","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html","https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html","https://crbug.com/1121414","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWNBJFBPKYCYSZTS54FHNCRZG6KC2AIJ/","https://security.gentoo.org/glsa/202009-13","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-09-21T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8252","summary":"The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00181,"ranking_epss":0.39745,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html","https://hackerone.com/reports/965914","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/","https://security.gentoo.org/glsa/202009-15","https://security.netapp.com/advisory/ntap-20201009-0004/","https://usn.ubuntu.com/4548-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html","https://hackerone.com/reports/965914","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/","https://security.gentoo.org/glsa/202009-15","https://security.netapp.com/advisory/ntap-20201009-0004/","https://usn.ubuntu.com/4548-1/"],"published_time":"2020-09-18T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8201","summary":"Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.","cvss":7.4,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00632,"ranking_epss":0.70381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html","https://hackerone.com/reports/922597","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/","https://security.gentoo.org/glsa/202101-07","https://security.netapp.com/advisory/ntap-20201009-0004/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html","https://hackerone.com/reports/922597","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/","https://security.gentoo.org/glsa/202101-07","https://security.netapp.com/advisory/ntap-20201009-0004/"],"published_time":"2020-09-18T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0431","summary":"In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10516,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://source.android.com/security/bulletin/pixel/2020-09-01","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://source.android.com/security/bulletin/pixel/2020-09-01"],"published_time":"2020-09-17T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0432","summary":"In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://source.android.com/security/bulletin/pixel/2020-09-01","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://source.android.com/security/bulletin/pixel/2020-09-01"],"published_time":"2020-09-17T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0427","summary":"In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00171,"ranking_epss":0.38425,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html","https://source.android.com/security/bulletin/pixel/2020-09-01","https://www.starwindsoftware.com/security/sw-20210325-0005/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html","https://source.android.com/security/bulletin/pixel/2020-09-01","https://www.starwindsoftware.com/security/sw-20210325-0005/"],"published_time":"2020-09-17T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20919","summary":"An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.","cvss":4.7,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30263,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00013.html","https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4cc67ff","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-...","https://usn.ubuntu.com/4534-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00013.html","https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4cc67ff","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-...","https://usn.ubuntu.com/4534-1/"],"published_time":"2020-09-17T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25039","summary":"Sylabs Singularity 3.2.0 through 3.6.2 has Insecure Permissions on temporary directories used in fakeroot or user namespace container execution.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00815,"ranking_epss":0.74332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html","https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7","https://medium.com/sylabs","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html","https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7","https://medium.com/sylabs"],"published_time":"2020-09-16T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25040","summary":"Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00744,"ranking_epss":0.73067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html","https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762","https://medium.com/sylabs","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html","https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762","https://medium.com/sylabs"],"published_time":"2020-09-16T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14393","summary":"A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://bugzilla.redhat.com/show_bug.cgi?id=1877409","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://bugzilla.redhat.com/show_bug.cgi?id=1877409","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643"],"published_time":"2020-09-16T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14386","summary":"A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.","cvss":6.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00594,"ranking_epss":0.69333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNCPXERMUHPSGF6S2VVFL5NVVPBBFB63/","https://seclists.org/oss-sec/2020/q3/146","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNCPXERMUHPSGF6S2VVFL5NVVPBBFB63/","https://seclists.org/oss-sec/2020/q3/146"],"published_time":"2020-09-16T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14392","summary":"An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00156,"ranking_epss":0.36434,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643","https://usn.ubuntu.com/4503-1/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643","https://usn.ubuntu.com/4503-1/"],"published_time":"2020-09-16T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8927","summary":"A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.","cvss":5.3,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0031,"ranking_epss":0.54189,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html","https://github.com/google/brotli/releases/tag/v1.0.9","https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/","https://usn.ubuntu.com/4568-1/","https://www.debian.org/security/2020/dsa-4801","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html","https://github.com/google/brotli/releases/tag/v1.0.9","https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/","https://usn.ubuntu.com/4568-1/","https://www.debian.org/security/2020/dsa-4801"],"published_time":"2020-09-15T10:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25284","summary":"The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.","cvss":4.1,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00077,"ranking_epss":0.22898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://twitter.com/grsecurity/status/1304537507560919041","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://twitter.com/grsecurity/status/1304537507560919041"],"published_time":"2020-09-13T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6097","summary":"An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00288,"ranking_epss":0.52314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00058.html","https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html","https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00058.html","https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html","https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029"],"published_time":"2020-09-10T15:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25219","summary":"url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00449,"ranking_epss":0.6365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html","https://github.com/libproxy/libproxy/issues/134","https://lists.debian.org/debian-lts-announce/2020/09/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JF5JSONJNO64ARWRVOS6K6HSIPHEF3H2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSVZAAVHBJR3Z4MZNR55QW3OQFAS2STH/","https://usn.ubuntu.com/4514-1/","https://www.debian.org/security/2020/dsa-4800","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html","https://github.com/libproxy/libproxy/issues/134","https://lists.debian.org/debian-lts-announce/2020/09/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JF5JSONJNO64ARWRVOS6K6HSIPHEF3H2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSVZAAVHBJR3Z4MZNR55QW3OQFAS2STH/","https://usn.ubuntu.com/4514-1/","https://www.debian.org/security/2020/dsa-4800"],"published_time":"2020-09-09T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25212","summary":"A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00081,"ranking_epss":0.23767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://twitter.com/grsecurity/status/1303370421958578179","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4527-1/","https://usn.ubuntu.com/4578-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://twitter.com/grsecurity/status/1303370421958578179","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4527-1/","https://usn.ubuntu.com/4578-1/"],"published_time":"2020-09-09T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14342","summary":"It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.3311,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/","https://lists.samba.org/archive/samba-technical/2020-September/135747.html","https://security.gentoo.org/glsa/202009-16","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUMRICFXJVCBBOSKZSKT3HFVQM6VPJU3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBNFSTJOQWVPFZAUJNNMAPY45PW5RTTE/","https://lists.samba.org/archive/samba-technical/2020-September/135747.html","https://security.gentoo.org/glsa/202009-16"],"published_time":"2020-09-09T12:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20916","summary":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00622,"ranking_epss":0.70148,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html","https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace","https://github.com/pypa/pip/compare/19.1.1...19.2","https://github.com/pypa/pip/issues/6413","https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2022.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html","https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace","https://github.com/pypa/pip/compare/19.1.1...19.2","https://github.com/pypa/pip/issues/6413","https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2022.html"],"published_time":"2020-09-04T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24659","summary":"An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03633,"ranking_epss":0.87849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html","https://gitlab.com/gnutls/gnutls/-/issues/1071","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62BUAI4FQQLG6VTKRT7SUZPGJJ4NASQ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWN56FDLQQXT2D2YHNI4TYH432TDMQ7N/","https://security.gentoo.org/glsa/202009-01","https://security.netapp.com/advisory/ntap-20200911-0006/","https://usn.ubuntu.com/4491-1/","https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-09-04","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html","https://gitlab.com/gnutls/gnutls/-/issues/1071","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62BUAI4FQQLG6VTKRT7SUZPGJJ4NASQ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWN56FDLQQXT2D2YHNI4TYH432TDMQ7N/","https://security.gentoo.org/glsa/202009-01","https://security.netapp.com/advisory/ntap-20200911-0006/","https://usn.ubuntu.com/4491-1/","https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-09-04"],"published_time":"2020-09-04T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24977","summary":"GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0054,"ranking_epss":0.67668,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html","https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2","https://gitlab.gnome.org/GNOME/libxml2/-/issues/178","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/","https://security.gentoo.org/glsa/202107-05","https://security.netapp.com/advisory/ntap-20200924-0001/","https://security.netapp.com/advisory/ntap-20200924-0001/","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html","https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2","https://gitlab.gnome.org/GNOME/libxml2/-/issues/178","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/","https://security.gentoo.org/glsa/202107-05","https://security.netapp.com/advisory/ntap-20200924-0001/","https://security.netapp.com/advisory/ntap-20200924-0001/","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-09-04T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24553","summary":"Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0015,"ranking_epss":0.35569,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html","http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html","http://seclists.org/fulldisclosure/2020/Sep/5","http://seclists.org/fulldisclosure/2020/Sep/5","https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/","https://security.netapp.com/advisory/ntap-20200924-0003/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.redteam-pentesting.de/advisories/rt-sa-2020-004","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html","http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html","http://seclists.org/fulldisclosure/2020/Sep/5","http://seclists.org/fulldisclosure/2020/Sep/5","https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/","https://security.netapp.com/advisory/ntap-20200924-0003/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.redteam-pentesting.de/advisories/rt-sa-2020-004"],"published_time":"2020-09-02T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24654","summary":"In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.","cvss":3.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00845,"ranking_epss":0.74825,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00001.html","https://bugzilla.suse.com/show_bug.cgi?id=1175857","https://github.com/KDE/ark/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd","https://kde.org/info/security/advisory-20200827-1.txt","https://lists.debian.org/debian-lts-announce/2022/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXMMXNJDYOCJRZTESIUGHG6CS4RJKECX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJOZ6YRNPZX5MJGVBMOCOA7N6Z4EU2OK/","https://security.gentoo.org/glsa/202010-06","https://security.gentoo.org/glsa/202101-06","https://usn.ubuntu.com/4482-1/","https://www.debian.org/security/2020/dsa-4759","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00001.html","https://bugzilla.suse.com/show_bug.cgi?id=1175857","https://github.com/KDE/ark/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd","https://kde.org/info/security/advisory-20200827-1.txt","https://lists.debian.org/debian-lts-announce/2022/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXMMXNJDYOCJRZTESIUGHG6CS4RJKECX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJOZ6YRNPZX5MJGVBMOCOA7N6Z4EU2OK/","https://security.gentoo.org/glsa/202010-06","https://security.gentoo.org/glsa/202101-06","https://usn.ubuntu.com/4482-1/","https://www.debian.org/security/2020/dsa-4759"],"published_time":"2020-09-02T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15810","summary":"An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.","cvss":6.5,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00211,"ranking_epss":0.43622,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html","https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m","https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/","https://security.netapp.com/advisory/ntap-20210219-0007/","https://security.netapp.com/advisory/ntap-20210226-0006/","https://security.netapp.com/advisory/ntap-20210226-0007/","https://usn.ubuntu.com/4477-1/","https://usn.ubuntu.com/4551-1/","https://www.debian.org/security/2020/dsa-4751","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html","https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m","https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/","https://security.netapp.com/advisory/ntap-20210219-0007/","https://security.netapp.com/advisory/ntap-20210226-0006/","https://security.netapp.com/advisory/ntap-20210226-0007/","https://usn.ubuntu.com/4477-1/","https://usn.ubuntu.com/4551-1/","https://www.debian.org/security/2020/dsa-4751"],"published_time":"2020-09-02T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15811","summary":"An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00251,"ranking_epss":0.4851,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html","https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv","https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/","https://security.netapp.com/advisory/ntap-20210219-0007/","https://security.netapp.com/advisory/ntap-20210226-0006/","https://security.netapp.com/advisory/ntap-20210226-0007/","https://usn.ubuntu.com/4477-1/","https://usn.ubuntu.com/4551-1/","https://www.debian.org/security/2020/dsa-4751","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html","https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv","https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/","https://security.netapp.com/advisory/ntap-20210219-0007/","https://security.netapp.com/advisory/ntap-20210226-0006/","https://security.netapp.com/advisory/ntap-20210226-0007/","https://usn.ubuntu.com/4477-1/","https://usn.ubuntu.com/4551-1/","https://www.debian.org/security/2020/dsa-4751"],"published_time":"2020-09-02T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8023","summary":"A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SECURITY, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to escalate privileges from user ldap to root. This issue affects: SUSE Enterprise Storage 5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Debuginfo 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Debuginfo 11-SP4 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Point of Sale 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 11-SECURITY openldap2-client-openssl1 versions prior to 2.4.26-0.74.13.1. SUSE Linux Enterprise Server 11-SP4-LTSS openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 12-SP2-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP2-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP4 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.31.1. SUSE Linux Enterprise Server for SAP 12-SP2 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 12-SP3 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.31.1. SUSE OpenStack Cloud 7 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud 8 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud Crowbar 8 openldap2 versions prior to 2.4.41-18.71.2. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.12.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.3.1.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.18899,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1172698","https://bugzilla.suse.com/show_bug.cgi?id=1172698"],"published_time":"2020-09-01T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14364","summary":"An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.","cvss":5.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":5.0,"cvss_v4":null,"epss":0.13903,"ranking_epss":0.9433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html","https://bugzilla.redhat.com/show_bug.cgi?id=1869201","https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTZQUQ6ZBPMFMNAUQBVJFELYNMUZLL6P/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52WIRMZL6TZRYZ65N6OAYNNFHV62O2N/","https://security.gentoo.org/glsa/202009-14","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200924-0006/","https://usn.ubuntu.com/4511-1/","https://www.debian.org/security/2020/dsa-4760","https://www.openwall.com/lists/oss-security/2020/08/24/2","https://www.openwall.com/lists/oss-security/2020/08/24/3","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html","https://bugzilla.redhat.com/show_bug.cgi?id=1869201","https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTZQUQ6ZBPMFMNAUQBVJFELYNMUZLL6P/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52WIRMZL6TZRYZ65N6OAYNNFHV62O2N/","https://security.gentoo.org/glsa/202009-14","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200924-0006/","https://usn.ubuntu.com/4511-1/","https://www.debian.org/security/2020/dsa-4760","https://www.openwall.com/lists/oss-security/2020/08/24/2","https://www.openwall.com/lists/oss-security/2020/08/24/3"],"published_time":"2020-08-31T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-25032","summary":"An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00897,"ranking_epss":0.75667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html","https://github.com/corydolphin/flask-cors/releases/tag/3.0.9","https://www.debian.org/security/2020/dsa-4775","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html","https://github.com/corydolphin/flask-cors/releases/tag/3.0.9","https://www.debian.org/security/2020/dsa-4775"],"published_time":"2020-08-31T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14352","summary":"A flaw was found in librepo in versions before 1.12.1. A directory traversal vulnerability was found where it failed to sanitize paths in remote repository metadata. An attacker controlling a remote repository may be able to copy files outside of the destination directory on the targeted system via path traversal. This flaw could potentially result in system compromise via the overwriting of critical system files. The highest threat from this flaw is to users that make use of untrusted third-party repositories.","cvss":8.0,"cvss_version":3.0,"cvss_v2":8.5,"cvss_v3":8.0,"cvss_v4":null,"epss":0.04104,"ranking_epss":0.88614,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00055.html","https://bugzilla.redhat.com/show_bug.cgi?id=1866498","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33RX4P5R5YL4NZSFSE4NOX37X6YCXAS4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOMDEQBRJ7SO2QWL7H23G3VV2VSCUYOY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XDMHVY7OMIJNSPVZ2GJWHT77Z5V3YJ55/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00055.html","https://bugzilla.redhat.com/show_bug.cgi?id=1866498","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33RX4P5R5YL4NZSFSE4NOX37X6YCXAS4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOMDEQBRJ7SO2QWL7H23G3VV2VSCUYOY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XDMHVY7OMIJNSPVZ2GJWHT77Z5V3YJ55/"],"published_time":"2020-08-30T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24972","summary":"The Kleopatra component before 3.1.12 (and before 20.07.80) for GnuPG allows remote attackers to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to load an arbitrary DLL.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.21343,"ranking_epss":0.95703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00053.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00064.html","https://dev.gnupg.org/rKLEOPATRAb4bd63c1739900d94c04da03045e9445a5a5f54b","https://dev.gnupg.org/source/kleo/browse/master/CMakeLists.txt","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRIPL72WMXTVWS2M7WYV5SNPETYJ2YI7/","https://security.gentoo.org/glsa/202008-21","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00053.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00064.html","https://dev.gnupg.org/rKLEOPATRAb4bd63c1739900d94c04da03045e9445a5a5f54b","https://dev.gnupg.org/source/kleo/browse/master/CMakeLists.txt","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRIPL72WMXTVWS2M7WYV5SNPETYJ2YI7/","https://security.gentoo.org/glsa/202008-21"],"published_time":"2020-08-29T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24614","summary":"Fossil before 2.10.2, 2.11.x before 2.11.2, and 2.12.x before 2.12.1 allows remote authenticated users to execute arbitrary code. An attacker must have check-in privileges on the repository.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06403,"ranking_epss":0.91057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00065.html","http://www.openwall.com/lists/oss-security/2020/08/25/1","https://fossil-scm.org/forum/info/a05ae3ce7760daf6","https://fossil-scm.org/fossil/vdiff?branch=sec2020-2.12-patch&diff=1&w","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARYF4YMYXCANXUDS3B3CA4JGUZNUJOJA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVZK4K7SFBQRCGCHS76HW2LTSEH2KSUM/","https://security.gentoo.org/glsa/202011-04","https://www.openwall.com/lists/oss-security/2020/08/20/1","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00065.html","http://www.openwall.com/lists/oss-security/2020/08/25/1","https://fossil-scm.org/forum/info/a05ae3ce7760daf6","https://fossil-scm.org/fossil/vdiff?branch=sec2020-2.12-patch&diff=1&w","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARYF4YMYXCANXUDS3B3CA4JGUZNUJOJA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVZK4K7SFBQRCGCHS76HW2LTSEH2KSUM/","https://security.gentoo.org/glsa/202011-04","https://www.openwall.com/lists/oss-security/2020/08/20/1"],"published_time":"2020-08-25T14:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24606","summary":"Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.","cvss":8.6,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":8.6,"cvss_v4":null,"epss":0.06342,"ranking_epss":0.9101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html","http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch","https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg","https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/","https://security.netapp.com/advisory/ntap-20210219-0007/","https://security.netapp.com/advisory/ntap-20210226-0006/","https://security.netapp.com/advisory/ntap-20210226-0007/","https://usn.ubuntu.com/4477-1/","https://usn.ubuntu.com/4551-1/","https://www.debian.org/security/2020/dsa-4751","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html","http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch","https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg","https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/","https://security.netapp.com/advisory/ntap-20210219-0007/","https://security.netapp.com/advisory/ntap-20210226-0006/","https://security.netapp.com/advisory/ntap-20210226-0007/","https://usn.ubuntu.com/4477-1/","https://usn.ubuntu.com/4551-1/","https://www.debian.org/security/2020/dsa-4751"],"published_time":"2020-08-24T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14349","summary":"It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.","cvss":7.1,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.01548,"ranking_epss":0.81443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=1865744","https://security.gentoo.org/glsa/202008-13","https://security.netapp.com/advisory/ntap-20200918-0002/","https://usn.ubuntu.com/4472-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=1865744","https://security.gentoo.org/glsa/202008-13","https://security.netapp.com/advisory/ntap-20200918-0002/","https://usn.ubuntu.com/4472-1/"],"published_time":"2020-08-24T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14350","summary":"It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.","cvss":7.3,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08558,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=1865746","https://lists.debian.org/debian-lts-announce/2020/08/msg00028.html","https://security.gentoo.org/glsa/202008-13","https://security.netapp.com/advisory/ntap-20200918-0002/","https://usn.ubuntu.com/4472-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=1865746","https://lists.debian.org/debian-lts-announce/2020/08/msg00028.html","https://security.gentoo.org/glsa/202008-13","https://security.netapp.com/advisory/ntap-20200918-0002/","https://usn.ubuntu.com/4472-1/"],"published_time":"2020-08-24T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8620","summary":"In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08369,"ranking_epss":0.92317,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8620","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.synology.com/security/advisory/Synology_SA_20_19","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8620","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.synology.com/security/advisory/Synology_SA_20_19"],"published_time":"2020-08-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8621","summary":"In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04879,"ranking_epss":0.89586,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8621","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.synology.com/security/advisory/Synology_SA_20_19","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8621","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.synology.com/security/advisory/Synology_SA_20_19"],"published_time":"2020-08-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8622","summary":"In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02629,"ranking_epss":0.8571,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8622","https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://usn.ubuntu.com/4468-2/","https://www.debian.org/security/2020/dsa-4752","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.synology.com/security/advisory/Synology_SA_20_19","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8622","https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://usn.ubuntu.com/4468-2/","https://www.debian.org/security/2020/dsa-4752","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.synology.com/security/advisory/Synology_SA_20_19"],"published_time":"2020-08-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8623","summary":"In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with \"--enable-native-pkcs11\" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.18318,"ranking_epss":0.95227,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8623","https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.debian.org/security/2020/dsa-4752","https://www.synology.com/security/advisory/Synology_SA_20_19","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8623","https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.debian.org/security/2020/dsa-4752","https://www.synology.com/security/advisory/Synology_SA_20_19"],"published_time":"2020-08-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8624","summary":"In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01632,"ranking_epss":0.81937,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8624","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.debian.org/security/2020/dsa-4752","https://www.synology.com/security/advisory/Synology_SA_20_19","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8624","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/","https://security.gentoo.org/glsa/202008-19","https://security.netapp.com/advisory/ntap-20200827-0003/","https://usn.ubuntu.com/4468-1/","https://www.debian.org/security/2020/dsa-4752","https://www.synology.com/security/advisory/Synology_SA_20_19"],"published_time":"2020-08-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14356","summary":"A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00765,"ranking_epss":0.7349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html","https://bugzilla.kernel.org/show_bug.cgi?id=208003","https://bugzilla.redhat.com/show_bug.cgi?id=1868453","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/","https://security.netapp.com/advisory/ntap-20200904-0002/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4484-1/","https://usn.ubuntu.com/4526-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html","https://bugzilla.kernel.org/show_bug.cgi?id=208003","https://bugzilla.redhat.com/show_bug.cgi?id=1868453","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/","https://security.netapp.com/advisory/ntap-20200904-0002/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4484-1/","https://usn.ubuntu.com/4526-1/"],"published_time":"2020-08-19T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24394","summary":"In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.15139,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962254","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832","https://security.netapp.com/advisory/ntap-20200904-0003/","https://usn.ubuntu.com/4465-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.starwindsoftware.com/security/sw-20210325-0004/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962254","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832","https://security.netapp.com/advisory/ntap-20200904-0003/","https://usn.ubuntu.com/4465-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.starwindsoftware.com/security/sw-20210325-0004/"],"published_time":"2020-08-19T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1472","summary":"An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.\nTo exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.\nMicrosoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.\nFor guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see  How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).\nWhen the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.","cvss":5.5,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.9438,"ranking_epss":0.99969,"kev":true,"propose_action":"Microsoft's Netlogon Remote Protocol (MS-NRPC) contains a privilege escalation vulnerability when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller. An attacker who successfully exploits the vulnerability could run a specially crafted application on a device on the network. The vulnerability is also known under the moniker of Zerologon.","ransomware_campaign":"Known","references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html","http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html","http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html","http://www.openwall.com/lists/oss-security/2020/09/17/2","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472","https://security.gentoo.org/glsa/202012-24","https://usn.ubuntu.com/4510-1/","https://usn.ubuntu.com/4510-2/","https://usn.ubuntu.com/4559-1/","https://www.kb.cert.org/vuls/id/490028","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.synology.com/security/advisory/Synology_SA_20_21","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html","http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html","http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html","http://www.openwall.com/lists/oss-security/2020/09/17/2","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472","https://security.gentoo.org/glsa/202012-24","https://usn.ubuntu.com/4510-1/","https://usn.ubuntu.com/4510-2/","https://usn.ubuntu.com/4559-1/","https://www.kb.cert.org/vuls/id/490028","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.synology.com/security/advisory/Synology_SA_20_21","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1472"],"published_time":"2020-08-17T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8233","summary":"A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14944,"ranking_epss":0.94573,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html","https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-9-1-v1-9-1/8a87dfc5-70f5-4055-8d67-570db1f5695c","https://community.ui.com/releases/Security-advisory-bulletin-014-014/1c32c056-2c64-4e60-ac23-ce7d8f387821","https://www.ui.com/download/edgemax","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html","https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-9-1-v1-9-1/8a87dfc5-70f5-4055-8d67-570db1f5695c","https://community.ui.com/releases/Security-advisory-bulletin-014-014/1c32c056-2c64-4e60-ac23-ce7d8f387821","https://www.ui.com/download/edgemax"],"published_time":"2020-08-17T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-17498","summary":"In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.4588,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=76afda963de4f0b9be24f2d8e873990a5cbf221b","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AII7UYDPNKYE75AZL45M6HAV2COP7F6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7LO7DAPN33FL4JQ7DDPB76SIEFGMZSQ/","https://security.gentoo.org/glsa/202008-14","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-10.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=76afda963de4f0b9be24f2d8e873990a5cbf221b","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AII7UYDPNKYE75AZL45M6HAV2COP7F6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7LO7DAPN33FL4JQ7DDPB76SIEFGMZSQ/","https://security.gentoo.org/glsa/202008-14","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.wireshark.org/security/wnpa-sec-2020-10.html"],"published_time":"2020-08-13T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-17489","summary":"An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)","cvss":4.3,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00149,"ranking_epss":0.35438,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00028.html","https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2997","https://lists.debian.org/debian-lts-announce/2020/09/msg00014.html","https://security.gentoo.org/glsa/202009-08","https://usn.ubuntu.com/4464-1/","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00028.html","https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2997","https://lists.debian.org/debian-lts-announce/2020/09/msg00014.html","https://security.gentoo.org/glsa/202009-08","https://usn.ubuntu.com/4464-1/"],"published_time":"2020-08-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16092","summary":"In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.","cvss":3.8,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11472,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html","http://www.openwall.com/lists/oss-security/2020/08/10/1","https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html","https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg07563.html","https://security.gentoo.org/glsa/202208-27","https://security.netapp.com/advisory/ntap-20200821-0006/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4760","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html","http://www.openwall.com/lists/oss-security/2020/08/10/1","https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html","https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg07563.html","https://security.gentoo.org/glsa/202208-27","https://security.netapp.com/advisory/ntap-20200821-0006/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4760"],"published_time":"2020-08-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-17367","summary":"Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00135,"ranking_epss":0.33223,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html","https://github.com/netblue30/firejail","https://lists.debian.org/debian-lts-announce/2020/08/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFXN3JJG4DIMN4TAHOTKFMS7SGM4EOTR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W66IR5YT4KG464SKEMQN2NP2LGATGEGS/","https://security.gentoo.org/glsa/202101-02","https://www.debian.org/security/2020/dsa-4742","https://www.debian.org/security/2020/dsa-4743","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html","https://github.com/netblue30/firejail","https://lists.debian.org/debian-lts-announce/2020/08/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFXN3JJG4DIMN4TAHOTKFMS7SGM4EOTR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W66IR5YT4KG464SKEMQN2NP2LGATGEGS/","https://security.gentoo.org/glsa/202101-02","https://www.debian.org/security/2020/dsa-4742","https://www.debian.org/security/2020/dsa-4743"],"published_time":"2020-08-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-17368","summary":"Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0449,"ranking_epss":0.89132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html","https://github.com/netblue30/firejail/","https://lists.debian.org/debian-lts-announce/2020/08/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFXN3JJG4DIMN4TAHOTKFMS7SGM4EOTR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W66IR5YT4KG464SKEMQN2NP2LGATGEGS/","https://security.gentoo.org/glsa/202101-02","https://www.debian.org/security/2020/dsa-4742","https://www.debian.org/security/2020/dsa-4743","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html","https://github.com/netblue30/firejail/","https://lists.debian.org/debian-lts-announce/2020/08/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFXN3JJG4DIMN4TAHOTKFMS7SGM4EOTR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W66IR5YT4KG464SKEMQN2NP2LGATGEGS/","https://security.gentoo.org/glsa/202101-02","https://www.debian.org/security/2020/dsa-4742","https://www.debian.org/security/2020/dsa-4743"],"published_time":"2020-08-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15655","summary":"A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00229,"ranking_epss":0.45798,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1645204","https://usn.ubuntu.com/4443-1/","https://www.mozilla.org/security/advisories/mfsa2020-30/","https://www.mozilla.org/security/advisories/mfsa2020-32/","https://www.mozilla.org/security/advisories/mfsa2020-33/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1645204","https://usn.ubuntu.com/4443-1/","https://www.mozilla.org/security/advisories/mfsa2020-30/","https://www.mozilla.org/security/advisories/mfsa2020-32/","https://www.mozilla.org/security/advisories/mfsa2020-33/"],"published_time":"2020-08-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15656","summary":"JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00695,"ranking_epss":0.71944,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1647293","https://usn.ubuntu.com/4443-1/","https://www.mozilla.org/security/advisories/mfsa2020-30/","https://www.mozilla.org/security/advisories/mfsa2020-32/","https://www.mozilla.org/security/advisories/mfsa2020-33/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1647293","https://usn.ubuntu.com/4443-1/","https://www.mozilla.org/security/advisories/mfsa2020-30/","https://www.mozilla.org/security/advisories/mfsa2020-32/","https://www.mozilla.org/security/advisories/mfsa2020-33/"],"published_time":"2020-08-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15659","summary":"Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0093,"ranking_epss":0.76133,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1550133%2C1633880%2C1643613%2C1644839%2C1645835%2C1646006%2C1646787%2C1649347%2C1650811%2C1651678","https://usn.ubuntu.com/4443-1/","https://www.mozilla.org/security/advisories/mfsa2020-30/","https://www.mozilla.org/security/advisories/mfsa2020-31/","https://www.mozilla.org/security/advisories/mfsa2020-32/","https://www.mozilla.org/security/advisories/mfsa2020-33/","https://www.mozilla.org/security/advisories/mfsa2020-35/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1550133%2C1633880%2C1643613%2C1644839%2C1645835%2C1646006%2C1646787%2C1649347%2C1650811%2C1651678","https://usn.ubuntu.com/4443-1/","https://www.mozilla.org/security/advisories/mfsa2020-30/","https://www.mozilla.org/security/advisories/mfsa2020-31/","https://www.mozilla.org/security/advisories/mfsa2020-32/","https://www.mozilla.org/security/advisories/mfsa2020-33/","https://www.mozilla.org/security/advisories/mfsa2020-35/"],"published_time":"2020-08-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9490","summary":"Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.76276,"ranking_epss":0.98932,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html","http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html","https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r0b6541c5fb2f8fb383861333400add7def625bc993300300de0b4f8d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9e485ce5a01c9dc3d4d785a7d28aa7400ead1e81884034ff1f03cfee%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/ra4da876037477c06f2677d7a1e10b5a8613000fca99c813958070fe9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rfed9fea918e090383da33e393eb6c2755fccf05032bd7d6eb4737c9e%40%3Ccvs.httpd.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/","https://security.gentoo.org/glsa/202008-04","https://security.netapp.com/advisory/ntap-20200814-0005/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html","http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html","https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r0b6541c5fb2f8fb383861333400add7def625bc993300300de0b4f8d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9e485ce5a01c9dc3d4d785a7d28aa7400ead1e81884034ff1f03cfee%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/ra4da876037477c06f2677d7a1e10b5a8613000fca99c813958070fe9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rfed9fea918e090383da33e393eb6c2755fccf05032bd7d6eb4737c9e%40%3Ccvs.httpd.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/","https://security.gentoo.org/glsa/202008-04","https://security.netapp.com/advisory/ntap-20200814-0005/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-08-07T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11984","summary":"Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.75348,"ranking_epss":0.98889,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html","http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html","http://www.openwall.com/lists/oss-security/2020/08/08/1","http://www.openwall.com/lists/oss-security/2020/08/08/10","http://www.openwall.com/lists/oss-security/2020/08/08/8","http://www.openwall.com/lists/oss-security/2020/08/08/9","http://www.openwall.com/lists/oss-security/2020/08/10/5","http://www.openwall.com/lists/oss-security/2020/08/17/2","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/","https://security.gentoo.org/glsa/202008-04","https://security.netapp.com/advisory/ntap-20200814-0005/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html","http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html","http://www.openwall.com/lists/oss-security/2020/08/08/1","http://www.openwall.com/lists/oss-security/2020/08/08/10","http://www.openwall.com/lists/oss-security/2020/08/08/8","http://www.openwall.com/lists/oss-security/2020/08/08/9","http://www.openwall.com/lists/oss-security/2020/08/10/5","http://www.openwall.com/lists/oss-security/2020/08/17/2","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/","https://security.gentoo.org/glsa/202008-04","https://security.netapp.com/advisory/ntap-20200814-0005/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-08-07T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11993","summary":"Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above \"info\" will mitigate this vulnerability for unpatched servers.","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.33361,"ranking_epss":0.9693,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html","http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html","https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11993","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/","https://security.gentoo.org/glsa/202008-04","https://security.netapp.com/advisory/ntap-20200814-0005/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html","http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html","https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11993","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/","https://security.gentoo.org/glsa/202008-04","https://security.netapp.com/advisory/ntap-20200814-0005/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-08-07T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8026","summary":"A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.","cvss":8.4,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html","https://bugzilla.suse.com/show_bug.cgi?id=1172573","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html","https://bugzilla.suse.com/show_bug.cgi?id=1172573"],"published_time":"2020-08-07T10:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16845","summary":"Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00147,"ranking_epss":0.35218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html","https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo","https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q","https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/","https://security.netapp.com/advisory/ntap-20200924-0002/","https://www.debian.org/security/2021/dsa-4848","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html","https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo","https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q","https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/","https://security.netapp.com/advisory/ntap-20200924-0002/","https://www.debian.org/security/2021/dsa-4848","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2020-08-06T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14344","summary":"An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00162,"ranking_epss":0.37087,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/","https://lists.x.org/archives/xorg-announce/2020-July/003050.html","https://security.gentoo.org/glsa/202008-18","https://usn.ubuntu.com/4487-1/","https://usn.ubuntu.com/4487-2/","https://www.openwall.com/lists/oss-security/2020/07/31/1","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/","https://lists.x.org/archives/xorg-announce/2020-July/003050.html","https://security.gentoo.org/glsa/202008-18","https://usn.ubuntu.com/4487-1/","https://usn.ubuntu.com/4487-2/","https://www.openwall.com/lists/oss-security/2020/07/31/1"],"published_time":"2020-08-05T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-17353","summary":"scm/define-stencil-commands.scm in LilyPond through 2.20.0, and 2.21.x through 2.21.4, when -dsafe is used, lacks restrictions on embedded-ps and embedded-svg, as demonstrated by including dangerous PostScript code.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01263,"ranking_epss":0.79464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.savannah.gnu.org/gitweb/?p=lilypond.git%3Ba=commit%3Bh=b84ea4740f3279516905c5db05f4074e777c16ff","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00076.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QG2JUV4UTIA27JUE6IZLCEFP5PYSFPF4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2JYMVLTPSNYS5F7TBHKIXUZZJIJAMRX/","https://www.debian.org/security/2020/dsa-4756","http://git.savannah.gnu.org/gitweb/?p=lilypond.git%3Ba=commit%3Bh=b84ea4740f3279516905c5db05f4074e777c16ff","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00076.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QG2JUV4UTIA27JUE6IZLCEFP5PYSFPF4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2JYMVLTPSNYS5F7TBHKIXUZZJIJAMRX/","https://www.debian.org/security/2020/dsa-4756"],"published_time":"2020-08-05T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16116","summary":"In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.","cvss":3.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00864,"ranking_epss":0.75134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00023.html","https://github.com/KDE/ark/commits/master","https://invent.kde.org/utilities/ark/-/commit/0df592524fed305d6fbe74ddf8a196bc9ffdb92f","https://kde.org/info/security/advisory-20200730-1.txt","https://lists.debian.org/debian-lts-announce/2022/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMVXSQNCBILVSJLX32ODNU6KUY2X7HRM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYRKQKUVU45ANH5TFYCYZN6HVP34N3UL/","https://security.gentoo.org/glsa/202008-03","https://usn.ubuntu.com/4461-1/","https://www.debian.org/security/2020/dsa-4738","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00023.html","https://github.com/KDE/ark/commits/master","https://invent.kde.org/utilities/ark/-/commit/0df592524fed305d6fbe74ddf8a196bc9ffdb92f","https://kde.org/info/security/advisory-20200730-1.txt","https://lists.debian.org/debian-lts-announce/2022/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMVXSQNCBILVSJLX32ODNU6KUY2X7HRM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYRKQKUVU45ANH5TFYCYZN6HVP34N3UL/","https://security.gentoo.org/glsa/202008-03","https://usn.ubuntu.com/4461-1/","https://www.debian.org/security/2020/dsa-4738"],"published_time":"2020-08-03T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14310","summary":"There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.","cvss":5.7,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16893,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310","https://security.gentoo.org/glsa/202104-05","https://usn.ubuntu.com/4432-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310","https://security.gentoo.org/glsa/202104-05","https://usn.ubuntu.com/4432-1/"],"published_time":"2020-07-31T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14311","summary":"There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.","cvss":5.7,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.08975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311","https://security.gentoo.org/glsa/202104-05","https://usn.ubuntu.com/4432-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311","https://security.gentoo.org/glsa/202104-05","https://usn.ubuntu.com/4432-1/"],"published_time":"2020-07-31T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16166","summary":"The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.01676,"ranking_epss":0.82197,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","https://arxiv.org/pdf/2012.07432.pdf","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f227e3ec3b5cad859ad15666874405e8c1bbc1d4","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638","https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAPTLPAEKVAJYJ4LHN7VH4CN2W75R2YW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/","https://security.netapp.com/advisory/ntap-20200814-0004/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","https://arxiv.org/pdf/2012.07432.pdf","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f227e3ec3b5cad859ad15666874405e8c1bbc1d4","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638","https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAPTLPAEKVAJYJ4LHN7VH4CN2W75R2YW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/","https://security.netapp.com/advisory/ntap-20200814-0004/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2020-07-30T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10713","summary":"A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","cvss":8.2,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49309,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://www.openwall.com/lists/oss-security/2020/07/29/3","https://bugzilla.redhat.com/show_bug.cgi?id=1825243","https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713","https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://kb.vmware.com/s/article/80181","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY","https://usn.ubuntu.com/4432-1/","https://www.debian.org/security/2020/dsa-4735","https://www.kb.cert.org/vuls/id/174059","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://www.openwall.com/lists/oss-security/2020/07/29/3","https://bugzilla.redhat.com/show_bug.cgi?id=1825243","https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713","https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://kb.vmware.com/s/article/80181","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY","https://usn.ubuntu.com/4432-1/","https://www.debian.org/security/2020/dsa-4735","https://www.kb.cert.org/vuls/id/174059"],"published_time":"2020-07-30T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14309","summary":"There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13636,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","https://bugzilla.redhat.com/show_bug.cgi?id=1852022","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","https://bugzilla.redhat.com/show_bug.cgi?id=1852022","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/"],"published_time":"2020-07-30T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14308","summary":"In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.0973,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://bugzilla.redhat.com/show_bug.cgi?id=1852009","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://bugzilla.redhat.com/show_bug.cgi?id=1852009","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/"],"published_time":"2020-07-29T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-16118","summary":"In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00617,"ranking_epss":0.69983,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html","https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5","https://gitlab.gnome.org/GNOME/balsa/-/issues/23","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html","https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5","https://gitlab.gnome.org/GNOME/balsa/-/issues/23"],"published_time":"2020-07-29T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15705","summary":"GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06312,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html","http://ubuntu.com/security/notices/USN-4432-1","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2021/03/02/3","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://access.redhat.com/security/vulnerabilities/grub2bootloader","https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass","https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot","https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://www.openwall.com/lists/oss-security/2020/07/29/3","https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/","https://www.suse.com/support/kb/doc/?id=000019673","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html","http://ubuntu.com/security/notices/USN-4432-1","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2021/03/02/3","http://www.openwall.com/lists/oss-security/2021/09/17/2","http://www.openwall.com/lists/oss-security/2021/09/17/4","http://www.openwall.com/lists/oss-security/2021/09/21/1","https://access.redhat.com/security/vulnerabilities/grub2bootloader","https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass","https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot","https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://www.openwall.com/lists/oss-security/2020/07/29/3","https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/","https://www.suse.com/support/kb/doc/?id=000019673"],"published_time":"2020-07-29T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15706","summary":"GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16207,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://ubuntu.com/security/notices/USN-4432-1","http://www.openwall.com/lists/oss-security/2020/07/29/3","https://access.redhat.com/security/vulnerabilities/grub2bootloader","https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass","https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot","https://www.debian.org/security/2020/dsa-4735","https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://www.openwall.com/lists/oss-security/2020/07/29/3","https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/","https://www.suse.com/support/kb/doc/?id=000019673","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://ubuntu.com/security/notices/USN-4432-1","http://www.openwall.com/lists/oss-security/2020/07/29/3","https://access.redhat.com/security/vulnerabilities/grub2bootloader","https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass","https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot","https://www.debian.org/security/2020/dsa-4735","https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://www.openwall.com/lists/oss-security/2020/07/29/3","https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/","https://www.suse.com/support/kb/doc/?id=000019673"],"published_time":"2020-07-29T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15707","summary":"Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.","cvss":5.7,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09035,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://ubuntu.com/security/notices/USN-4432-1","http://www.openwall.com/lists/oss-security/2020/07/29/3","https://access.redhat.com/security/vulnerabilities/grub2bootloader","https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass","https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot","https://www.debian.org/security/2020/dsa-4735","https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://www.openwall.com/lists/oss-security/2020/07/29/3","https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/","https://www.suse.com/support/kb/doc/?id=000019673","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html","http://ubuntu.com/security/notices/USN-4432-1","http://www.openwall.com/lists/oss-security/2020/07/29/3","https://access.redhat.com/security/vulnerabilities/grub2bootloader","https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011","https://security.gentoo.org/glsa/202104-05","https://security.netapp.com/advisory/ntap-20200731-0008/","https://usn.ubuntu.com/4432-1/","https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass","https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot","https://www.debian.org/security/2020/dsa-4735","https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/","https://www.openwall.com/lists/oss-security/2020/07/29/3","https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/","https://www.suse.com/support/kb/doc/?id=000019673"],"published_time":"2020-07-29T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15900","summary":"A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.10993,"ranking_epss":0.93448,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.ghostscript.com/?p=ghostpdl.git%3Ba=log","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html","https://artifex.com/security-advisories/CVE-2020-15900","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5d499272b95a6b890a1397e11d20937de000d31b","https://github.com/ArtifexSoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b","https://github.com/ArtifexSoftware/ghostpdl/commits/master/psi/zstring.c","https://security.gentoo.org/glsa/202008-20","https://usn.ubuntu.com/4445-1/","http://git.ghostscript.com/?p=ghostpdl.git%3Ba=log","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html","https://artifex.com/security-advisories/CVE-2020-15900","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5d499272b95a6b890a1397e11d20937de000d31b","https://github.com/ArtifexSoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b","https://github.com/ArtifexSoftware/ghostpdl/commits/master/psi/zstring.c","https://security.gentoo.org/glsa/202008-20","https://usn.ubuntu.com/4445-1/"],"published_time":"2020-07-28T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15103","summary":"In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto","cvss":3.5,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html","https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4","https://github.com/FreeRDP/FreeRDP/pull/6382","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html","https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4","https://github.com/FreeRDP/FreeRDP/pull/6382","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-07-27T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15917","summary":"common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02235,"ranking_epss":0.84565,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00090.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00013.html","https://git.claws-mail.org/?p=claws.git%3Ba=blob%3Bf=RELEASE_NOTES","https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=fcc25329049b6f9bd8d890f1197ed61eb12e14d5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YVQB7NRBHO67Q74RS7RZCMW4ENRVBB4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7UX65342HRVDQML4G4GEVEUB764EUM5/","https://security.gentoo.org/glsa/202007-56","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00090.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00013.html","https://git.claws-mail.org/?p=claws.git%3Ba=blob%3Bf=RELEASE_NOTES","https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=fcc25329049b6f9bd8d890f1197ed61eb12e14d5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YVQB7NRBHO67Q74RS7RZCMW4ENRVBB4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7UX65342HRVDQML4G4GEVEUB764EUM5/","https://security.gentoo.org/glsa/202007-56"],"published_time":"2020-07-23T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6524","summary":"Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02094,"ranking_epss":0.84061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1081722","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1081722","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6525","summary":"Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01651,"ranking_epss":0.8205,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1091670","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1091670","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6526","summary":"Inappropriate implementation in iframe sandbox in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01673,"ranking_epss":0.8217,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1074340","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1074340","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6527","summary":"Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00887,"ranking_epss":0.7551,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/992698","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/992698","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6528","summary":"Incorrect security UI in basic auth in Google Chrome on iOS prior to 84.0.4147.89 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01736,"ranking_epss":0.82515,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1063690","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1063690","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6529","summary":"Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to leak cross-origin data via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00623,"ranking_epss":0.70194,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/978779","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/978779","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6530","summary":"Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01352,"ranking_epss":0.80135,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1016278","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1016278","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6531","summary":"Side-channel information leakage in scroll to text in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01496,"ranking_epss":0.81148,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1042986","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1042986","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6533","summary":"Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02277,"ranking_epss":0.8469,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1069964","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1069964","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6534","summary":"Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01629,"ranking_epss":0.81911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1072412","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1072412","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6535","summary":"Insufficient data validation in WebUI in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had compromised the renderer process to inject scripts or HTML into a privileged page via a crafted HTML page.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.01139,"ranking_epss":0.78427,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1073409","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1073409","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6536","summary":"Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01736,"ranking_epss":0.82515,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1080934","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1080934","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6510","summary":"Heap buffer overflow in background fetch in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00446,"ranking_epss":0.63481,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1103195","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1103195","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6511","summary":"Information leak in content security policy in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0241,"ranking_epss":0.85115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1074317","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1074317","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6512","summary":"Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04245,"ranking_epss":0.88809,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1084820","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1084820","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6513","summary":"Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01703,"ranking_epss":0.82336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1091404","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1091404","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6514","summary":"Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.14455,"ranking_epss":0.94456,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1076703","https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202007-64","https://security.gentoo.org/glsa/202101-30","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211292","https://usn.ubuntu.com/4443-1/","https://www.debian.org/security/2020/dsa-4736","https://www.debian.org/security/2020/dsa-4740","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1076703","https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202007-64","https://security.gentoo.org/glsa/202101-30","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211292","https://usn.ubuntu.com/4443-1/","https://www.debian.org/security/2020/dsa-4736","https://www.debian.org/security/2020/dsa-4740","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6515","summary":"Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03205,"ranking_epss":0.87034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1082755","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1082755","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6516","summary":"Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.03167,"ranking_epss":0.86952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1092449","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1092449","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6517","summary":"Heap buffer overflow in history in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01729,"ranking_epss":0.82488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1095560","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1095560","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6518","summary":"Use after free in developer tools in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03205,"ranking_epss":0.87034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/986051","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/986051","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6519","summary":"Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.23706,"ranking_epss":0.96013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1064676","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1064676","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6520","summary":"Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01729,"ranking_epss":0.82488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1092274","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1092274","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6521","summary":"Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0241,"ranking_epss":0.85115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1075734","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1075734","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6522","summary":"Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.02277,"ranking_epss":0.8469,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1052093","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1052093","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6523","summary":"Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03205,"ranking_epss":0.87034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1080481","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html","https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html","https://crbug.com/1080481","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/","https://security.gentoo.org/glsa/202007-08","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2021/dsa-4824"],"published_time":"2020-07-22T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0305","summary":"In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","https://source.android.com/security/bulletin/pixel/2020-06-01","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","https://source.android.com/security/bulletin/pixel/2020-06-01"],"published_time":"2020-07-17T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14039","summary":"In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00431,"ranking_epss":0.62667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html","https://groups.google.com/forum/#%21forum/golang-announce","https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w","https://security.netapp.com/advisory/ntap-20200731-0005/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html","https://groups.google.com/forum/#%21forum/golang-announce","https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w","https://security.netapp.com/advisory/ntap-20200731-0005/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2020-07-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15586","summary":"Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00614,"ranking_epss":0.69925,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html","https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w","https://groups.google.com/forum/#%21topic/golang-announce/f2c5bqrGH_g","https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/","https://security.netapp.com/advisory/ntap-20200731-0005/","https://www.cloudfoundry.org/blog/cve-2020-15586/","https://www.debian.org/security/2021/dsa-4848","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html","https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w","https://groups.google.com/forum/#%21topic/golang-announce/f2c5bqrGH_g","https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/","https://security.netapp.com/advisory/ntap-20200731-0005/","https://www.cloudfoundry.org/blog/cve-2020-15586/","https://www.debian.org/security/2021/dsa-4848","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2020-07-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15803","summary":"Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.05067,"ranking_epss":0.89805,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html","https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/","https://support.zabbix.com/browse/ZBX-18057","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html","https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/","https://support.zabbix.com/browse/ZBX-18057"],"published_time":"2020-07-17T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15780","summary":"An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.","cvss":6.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00695,"ranking_epss":0.71951,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","http://www.openwall.com/lists/oss-security/2020/07/20/7","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2020/07/30/2","http://www.openwall.com/lists/oss-security/2020/07/30/3","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354","https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh","https://usn.ubuntu.com/4425-1/","https://usn.ubuntu.com/4426-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://www.openwall.com/lists/oss-security/2020/06/15/3","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","http://www.openwall.com/lists/oss-security/2020/07/20/7","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2020/07/30/2","http://www.openwall.com/lists/oss-security/2020/07/30/3","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354","https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh","https://usn.ubuntu.com/4425-1/","https://usn.ubuntu.com/4426-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://www.openwall.com/lists/oss-security/2020/06/15/3"],"published_time":"2020-07-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20908","summary":"An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.","cvss":6.7,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://www.openwall.com/lists/oss-security/2020/07/20/6","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2020/07/30/2","http://www.openwall.com/lists/oss-security/2020/07/30/3","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e","https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh","https://mailarchives.bentasker.co.uk/Mirrors/OSSSec/2020/06-Jun/msg00035.html","https://usn.ubuntu.com/4426-1/","https://usn.ubuntu.com/4427-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://www.openwall.com/lists/oss-security/2020/07/20/6","http://www.openwall.com/lists/oss-security/2020/07/29/3","http://www.openwall.com/lists/oss-security/2020/07/30/2","http://www.openwall.com/lists/oss-security/2020/07/30/3","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e","https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh","https://mailarchives.bentasker.co.uk/Mirrors/OSSSec/2020/06-Jun/msg00035.html","https://usn.ubuntu.com/4426-1/","https://usn.ubuntu.com/4427-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/"],"published_time":"2020-07-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14711","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14711 is applicable to macOS host only. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00374,"ranking_epss":0.59125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14712","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).","cvss":5.0,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00312,"ranking_epss":0.54394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14713","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14714","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14715","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14698","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-901/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-901/"],"published_time":"2020-07-15T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14699","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-902/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-902/"],"published_time":"2020-07-15T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14700","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-903/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-903/"],"published_time":"2020-07-15T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14703","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":6.0,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00164,"ranking_epss":0.37331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-905/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-905/"],"published_time":"2020-07-15T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14704","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":6.0,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00164,"ranking_epss":0.37331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-904/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-904/"],"published_time":"2020-07-15T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14707","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H).","cvss":5.0,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00221,"ranking_epss":0.44791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14694","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-899/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-899/"],"published_time":"2020-07-15T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14695","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-900/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-900/"],"published_time":"2020-07-15T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14673","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-898/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-898/"],"published_time":"2020-07-15T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14674","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30251,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-896/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-896/"],"published_time":"2020-07-15T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14675","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.31577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-895/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-895/"],"published_time":"2020-07-15T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14676","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-894/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-894/"],"published_time":"2020-07-15T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14677","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.31577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-893/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-893/"],"published_time":"2020-07-15T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14646","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-888/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-888/"],"published_time":"2020-07-15T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14647","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-890/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-890/"],"published_time":"2020-07-15T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14648","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-889/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-889/"],"published_time":"2020-07-15T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14649","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-891/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-891/"],"published_time":"2020-07-15T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14650","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-892/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-892/"],"published_time":"2020-07-15T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14628","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14628 is applicable to Windows VM only. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":8.2,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00179,"ranking_epss":0.39555,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-886/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-886/"],"published_time":"2020-07-15T18:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14629","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":6.0,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00164,"ranking_epss":0.37331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-887/","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-887/"],"published_time":"2020-07-15T18:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14621","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00461,"ranking_epss":0.64185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14593","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).","cvss":7.4,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00409,"ranking_epss":0.61271,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14581","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00385,"ranking_epss":0.59747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14583","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).","cvss":8.3,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.3,"cvss_v4":null,"epss":0.01018,"ranking_epss":0.7725,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14573","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00385,"ranking_epss":0.59781,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14577","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00283,"ranking_epss":0.51771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14578","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00158,"ranking_epss":0.36683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14579","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00158,"ranking_epss":0.36683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14562","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00327,"ranking_epss":0.55683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14556","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.68847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","https://security.gentoo.org/glsa/202008-24","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200717-0005/","https://usn.ubuntu.com/4433-1/","https://usn.ubuntu.com/4453-1/","https://www.debian.org/security/2020/dsa-4734","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-07-15T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13934","summary":"An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.2338,"ranking_epss":0.95977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html","https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8%40%3Cdev.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html","https://security.netapp.com/advisory/ntap-20200724-0003/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html","https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8%40%3Cdev.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html","https://security.netapp.com/advisory/ntap-20200724-0003/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-07-14T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13935","summary":"The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.91745,"ranking_epss":0.99688,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html","https://security.netapp.com/advisory/ntap-20200724-0003/","https://usn.ubuntu.com/4448-1/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html","https://security.netapp.com/advisory/ntap-20200724-0003/","https://usn.ubuntu.com/4448-1/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-07-14T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13753","summary":"The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.","cvss":10.0,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":10.0,"cvss_v4":null,"epss":0.01219,"ranking_epss":0.79082,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/","https://security.gentoo.org/glsa/202007-11","https://trac.webkit.org/changeset/262368/webkit","https://usn.ubuntu.com/4422-1/","https://www.debian.org/security/2020/dsa-4724","https://www.openwall.com/lists/oss-security/2020/07/10/1","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/","https://security.gentoo.org/glsa/202007-11","https://trac.webkit.org/changeset/262368/webkit","https://usn.ubuntu.com/4422-1/","https://www.debian.org/security/2020/dsa-4724","https://www.openwall.com/lists/oss-security/2020/07/10/1"],"published_time":"2020-07-14T14:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15719","summary":"libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.","cvss":4.2,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00216,"ranking_epss":0.44117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html","https://access.redhat.com/errata/RHBA-2019:3674","https://bugs.openldap.org/show_bug.cgi?id=9266","https://bugzilla.redhat.com/show_bug.cgi?id=1740070","https://kc.mcafee.com/corporate/index?page=content&id=SB10365","https://www.oracle.com/security-alerts/cpuapr2022.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html","https://access.redhat.com/errata/RHBA-2019:3674","https://bugs.openldap.org/show_bug.cgi?id=9266","https://bugzilla.redhat.com/show_bug.cgi?id=1740070","https://kc.mcafee.com/corporate/index?page=content&id=SB10365","https://www.oracle.com/security-alerts/cpuapr2022.html"],"published_time":"2020-07-14T14:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20907","summary":"In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00323,"ranking_epss":0.55418,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html","https://bugs.python.org/issue39017","https://github.com/python/cpython/pull/21454","https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/","https://security.gentoo.org/glsa/202008-01","https://security.netapp.com/advisory/ntap-20200731-0002/","https://usn.ubuntu.com/4428-1/","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html","https://bugs.python.org/issue39017","https://github.com/python/cpython/pull/21454","https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html","https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/","https://security.gentoo.org/glsa/202008-01","https://security.netapp.com/advisory/ntap-20200731-0002/","https://usn.ubuntu.com/4428-1/","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2020-07-13T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10756","summary":"An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.","cvss":6.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06759,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html","https://bugzilla.redhat.com/show_bug.cgi?id=1835986","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYTZ32P67PZER6P7TW6FQK3SZRKQLVEI/","https://security.netapp.com/advisory/ntap-20201001-0001/","https://usn.ubuntu.com/4437-1/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728","https://www.zerodayinitiative.com/advisories/ZDI-20-1005/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html","https://bugzilla.redhat.com/show_bug.cgi?id=1835986","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYTZ32P67PZER6P7TW6FQK3SZRKQLVEI/","https://security.netapp.com/advisory/ntap-20201001-0001/","https://usn.ubuntu.com/4437-1/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728","https://www.zerodayinitiative.com/advisories/ZDI-20-1005/"],"published_time":"2020-07-09T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12422","summary":"In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.6,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00616,"ranking_epss":0.69961,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1450353","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1450353","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/"],"published_time":"2020-07-09T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12426","summary":"Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 78.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00823,"ranking_epss":0.74472,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1608068%2C1609951%2C1631187%2C1637682","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1608068%2C1609951%2C1631187%2C1637682","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/"],"published_time":"2020-07-09T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12415","summary":"When \"%2F\" was present in a manifest URL, Firefox's AppCache behavior may have become confused and allowed a manifest to be served from a subdirectory. This could cause the appcache to be used to service requests for the top level directory. This vulnerability affects Firefox < 78.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00353,"ranking_epss":0.57685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1586630","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1586630","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/"],"published_time":"2020-07-09T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12416","summary":"A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00671,"ranking_epss":0.71397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1639734","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1639734","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/"],"published_time":"2020-07-09T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12417","summary":"Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00475,"ranking_epss":0.64828,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1640737","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1640737","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/"],"published_time":"2020-07-09T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12418","summary":"Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0124,"ranking_epss":0.79273,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1641303","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1641303","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/"],"published_time":"2020-07-09T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12419","summary":"When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00464,"ranking_epss":0.64356,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1643874","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1643874","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/"],"published_time":"2020-07-09T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12420","summary":"When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00436,"ranking_epss":0.63041,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1643437","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1643437","https://security.gentoo.org/glsa/202007-09","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4421-1/","https://www.mozilla.org/security/advisories/mfsa2020-24/","https://www.mozilla.org/security/advisories/mfsa2020-25/","https://www.mozilla.org/security/advisories/mfsa2020-26/"],"published_time":"2020-07-09T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12402","summary":"During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.","cvss":4.4,"cvss_version":3.0,"cvss_v2":1.2,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1631597","https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4417-1/","https://usn.ubuntu.com/4417-2/","https://www.debian.org/security/2020/dsa-4726","https://www.mozilla.org/security/advisories/mfsa2020-24/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1631597","https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/","https://security.gentoo.org/glsa/202007-10","https://usn.ubuntu.com/4417-1/","https://usn.ubuntu.com/4417-2/","https://www.debian.org/security/2020/dsa-4726","https://www.mozilla.org/security/advisories/mfsa2020-24/"],"published_time":"2020-07-09T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12424","summary":"When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1562600","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1562600","https://security.gentoo.org/glsa/202007-10","https://www.mozilla.org/security/advisories/mfsa2020-24/"],"published_time":"2020-07-09T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15095","summary":"Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>\". The password value is not redacted and is printed to stdout and also to any generated log files.","cvss":4.4,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.4,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27686,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html","https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07","https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc","https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://security.gentoo.org/glsa/202101-07","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html","https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07","https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc","https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://security.gentoo.org/glsa/202101-07"],"published_time":"2020-07-07T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10745","summary":"A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19658,"ranking_epss":0.95435,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://www.samba.org/samba/security/CVE-2020-10745.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://www.samba.org/samba/security/CVE-2020-10745.html"],"published_time":"2020-07-07T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10730","summary":"A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0314,"ranking_epss":0.86903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://www.debian.org/security/2021/dsa-4884","https://www.samba.org/samba/security/CVE-2020-10730.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://www.debian.org/security/2021/dsa-4884","https://www.samba.org/samba/security/CVE-2020-10730.html"],"published_time":"2020-07-07T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15565","summary":"An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.1,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.2287,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/07/4","http://xenbits.xen.org/xsa/advisory-321.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/","https://security.gentoo.org/glsa/202007-02","https://www.debian.org/security/2020/dsa-4723","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/07/4","http://xenbits.xen.org/xsa/advisory-321.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/","https://security.gentoo.org/glsa/202007-02","https://www.debian.org/security/2020/dsa-4723"],"published_time":"2020-07-07T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15567","summary":"An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00056,"ranking_epss":0.17467,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/07/6","http://xenbits.xen.org/xsa/advisory-328.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/","https://security.gentoo.org/glsa/202007-02","https://www.debian.org/security/2020/dsa-4723","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/07/6","http://xenbits.xen.org/xsa/advisory-328.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/","https://security.gentoo.org/glsa/202007-02","https://www.debian.org/security/2020/dsa-4723"],"published_time":"2020-07-07T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15563","summary":"An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/07/3","http://xenbits.xen.org/xsa/advisory-319.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/","https://security.gentoo.org/glsa/202007-02","https://www.debian.org/security/2020/dsa-4723","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/07/3","http://xenbits.xen.org/xsa/advisory-319.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/","https://security.gentoo.org/glsa/202007-02","https://www.debian.org/security/2020/dsa-4723"],"published_time":"2020-07-07T13:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10760","summary":"A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02353,"ranking_epss":0.84928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://usn.ubuntu.com/4409-1/","https://www.samba.org/samba/security/CVE-2020-10760.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://usn.ubuntu.com/4409-1/","https://www.samba.org/samba/security/CVE-2020-10760.html"],"published_time":"2020-07-06T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14303","summary":"A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.26364,"ranking_epss":0.96325,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://security.netapp.com/advisory/ntap-20200709-0003/","https://usn.ubuntu.com/4454-1/","https://usn.ubuntu.com/4454-2/","https://www.samba.org/samba/security/CVE-2020-14303.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/","https://security.gentoo.org/glsa/202007-15","https://security.netapp.com/advisory/ntap-20200709-0003/","https://usn.ubuntu.com/4454-1/","https://usn.ubuntu.com/4454-2/","https://www.samba.org/samba/security/CVE-2020-14303.html"],"published_time":"2020-07-06T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15466","summary":"In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gvcp.c by ensuring that an offset increases in all situations.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00631,"ranking_epss":0.70345,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16029","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=11f40896b696e4e8c7f8b2ad96028404a83a51a4","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-09.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16029","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=11f40896b696e4e8c7f8b2ad96028404a83a51a4","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-09.html"],"published_time":"2020-07-05T11:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15396","summary":"In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.22259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html","https://bugzilla.suse.com/show_bug.cgi?id=1173521","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/","https://security.gentoo.org/glsa/202007-06","https://sourceforge.net/p/hylafax/HylaFAX+/2534/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html","https://bugzilla.suse.com/show_bug.cgi?id=1173521","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/","https://security.gentoo.org/glsa/202007-06","https://sourceforge.net/p/hylafax/HylaFAX+/2534/"],"published_time":"2020-06-30T12:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-18922","summary":"It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.04777,"ranking_epss":0.89478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","http://www.openwall.com/lists/oss-security/2020/06/30/3","https://bugzilla.redhat.com/show_bug.cgi?id=1852356","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/","https://usn.ubuntu.com/4407-1/","https://www.openwall.com/lists/oss-security/2020/06/30/2","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","http://www.openwall.com/lists/oss-security/2020/06/30/3","https://bugzilla.redhat.com/show_bug.cgi?id=1852356","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/","https://usn.ubuntu.com/4407-1/","https://www.openwall.com/lists/oss-security/2020/06/30/2"],"published_time":"2020-06-30T11:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15393","summary":"In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24586,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba","https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lkml.org/lkml/2020/6/2/968","https://usn.ubuntu.com/4463-1/","https://usn.ubuntu.com/4465-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba","https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lkml.org/lkml/2020/6/2/968","https://usn.ubuntu.com/4463-1/","https://usn.ubuntu.com/4465-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/"],"published_time":"2020-06-29T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-4067","summary":"In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.","cvss":7.0,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.0,"cvss_v4":null,"epss":0.01097,"ranking_epss":0.78045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html","https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15","https://github.com/coturn/coturn/issues/583","https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm","https://lists.debian.org/debian-lts-announce/2020/07/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5G35UBNSRLL6SYRTODYTMBJ65TLQILUM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNJJO77ZLGGFJWNUGP6VDG5HPAC5UDBK/","https://usn.ubuntu.com/4415-1/","https://www.debian.org/security/2020/dsa-4711","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html","https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15","https://github.com/coturn/coturn/issues/583","https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm","https://lists.debian.org/debian-lts-announce/2020/07/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5G35UBNSRLL6SYRTODYTMBJ65TLQILUM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNJJO77ZLGGFJWNUGP6VDG5HPAC5UDBK/","https://usn.ubuntu.com/4415-1/","https://www.debian.org/security/2020/dsa-4711"],"published_time":"2020-06-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3681","summary":"A External Control of File Name or Path vulnerability in osc of SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP4; openSUSE Leap 15.1, openSUSE Factory allowed remote attackers that can change downloaded packages to overwrite arbitrary files. This issue affects: SUSE Linux Enterprise Module for Development Tools 15 osc versions prior to 0.169.1-3.20.1. SUSE Linux Enterprise Software Development Kit 12-SP5 osc versions prior to 0.162.1-15.9.1. SUSE Linux Enterprise Software Development Kit 12-SP4 osc versions prior to 0.162.1-15.9.1. openSUSE Leap 15.1 osc versions prior to 0.169.1-lp151.2.15.1. openSUSE Factory osc versions prior to 0.169.0 .","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00913,"ranking_epss":0.75911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1122675","https://bugzilla.suse.com/show_bug.cgi?id=1122675"],"published_time":"2020-06-29T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8014","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of kopano-spamd of openSUSE Leap 15.1, openSUSE Tumbleweed allowed local attackers with the privileges of the kopano user to escalate to root. This issue affects: openSUSE Leap 15.1 kopano-spamd versions prior to 10.0.5-lp151.4.1. openSUSE Tumbleweed kopano-spamd versions prior to 10.0.5-1.1.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09763,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1164131","https://bugzilla.suse.com/show_bug.cgi?id=1164131"],"published_time":"2020-06-29T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8019","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Module for Legacy Software 12, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server for SAP 12-SP1; openSUSE Backports SLE-15-SP1, openSUSE Leap 15.1 allowed local attackers controlling the user news to escalate their privileges to root. This issue affects: SUSE Linux Enterprise Debuginfo 11-SP3 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Debuginfo 11-SP4 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Module for Legacy Software 12 syslog-ng versions prior to 3.6.4-12.8.1. SUSE Linux Enterprise Point of Sale 11-SP3 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Server 11-SP4-LTSS syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Server for SAP 12-SP1 syslog-ng versions prior to 3.6.4-12.8.1. openSUSE Backports SLE-15-SP1 syslog-ng versions prior to 3.19.1-bp151.4.6.1. openSUSE Leap 15.1 syslog-ng versions prior to 3.19.1-lp151.3.6.1.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00147,"ranking_epss":0.35149,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1169385","https://bugzilla.suse.com/show_bug.cgi?id=1169385"],"published_time":"2020-06-29T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8022","summary":"A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00187,"ranking_epss":0.40547,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html","https://bugzilla.suse.com/show_bug.cgi?id=1172405","https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be%40%3Cjava-dev.axis.apache.org%3E","https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928%40%3Cjava-dev.axis.apache.org%3E","https://lists.apache.org/thread.html/ra87ec20a0f4b226c81c7eed27e5d7433ccdc41e61a8da408a45f0fa1%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rf50d02409e5732c4ee37f19a193af171251a25a652599ce3c2bc69e7%40%3Cusers.tomcat.apache.org%3E","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html","https://bugzilla.suse.com/show_bug.cgi?id=1172405","https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be%40%3Cjava-dev.axis.apache.org%3E","https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928%40%3Cjava-dev.axis.apache.org%3E","https://lists.apache.org/thread.html/ra87ec20a0f4b226c81c7eed27e5d7433ccdc41e61a8da408a45f0fa1%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rf50d02409e5732c4ee37f19a193af171251a25a652599ce3c2bc69e7%40%3Cusers.tomcat.apache.org%3E"],"published_time":"2020-06-29T09:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8024","summary":"A Incorrect Default Permissions vulnerability in the packaging of hylafax+ of openSUSE Leap 15.2, openSUSE Leap 15.1, openSUSE Factory allows local attackers to escalate from user uucp to users calling hylafax binaries. This issue affects: openSUSE Leap 15.2 hylafax+ versions prior to 7.0.2-lp152.2.1. openSUSE Leap 15.1 hylafax+ version 5.6.1-lp151.3.7 and prior versions. openSUSE Factory hylafax+ versions prior to 7.0.2-2.1.","cvss":5.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.3621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00022.html","https://bugzilla.suse.com/show_bug.cgi?id=1172731","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00022.html","https://bugzilla.suse.com/show_bug.cgi?id=1172731"],"published_time":"2020-06-29T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11996","summary":"A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.45121,"ranking_epss":0.97607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html","https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c13ca9c5dec72f872cd%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d3015b8bbefea66e5c%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45c4d9fee3dc789dca9%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaff1057115008100561%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2a408b57a30926a42b%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081ff91864b1f2546bbd%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cfa95d0cd682d90d338%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b9bf6c5e635c53ff4b%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605eea9f74e51b792542%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b88fa109b76c83db52%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899bde60f6aaad4031b9%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html","https://security.netapp.com/advisory/ntap-20200709-0002/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html","https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c13ca9c5dec72f872cd%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d3015b8bbefea66e5c%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45c4d9fee3dc789dca9%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaff1057115008100561%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2a408b57a30926a42b%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081ff91864b1f2546bbd%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cfa95d0cd682d90d338%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b9bf6c5e635c53ff4b%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605eea9f74e51b792542%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b88fa109b76c83db52%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899bde60f6aaad4031b9%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html","https://security.netapp.com/advisory/ntap-20200709-0002/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-06-26T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10769","summary":"A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.3923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://bugzilla.redhat.com/show_bug.cgi?id=1708775%3B","https://lkml.org/lkml/2019/1/21/675","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://bugzilla.redhat.com/show_bug.cgi?id=1708775%3B","https://lkml.org/lkml/2019/1/21/675","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2020-06-26T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10753","summary":"A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.","cvss":5.4,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.61195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00062.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10753","https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFU7LXEL2UZE565FJBTY7UGH2O7ZUBVS/","https://security.gentoo.org/glsa/202105-39","https://usn.ubuntu.com/4528-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00062.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10753","https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFU7LXEL2UZE565FJBTY7UGH2O7ZUBVS/","https://security.gentoo.org/glsa/202105-39","https://usn.ubuntu.com/4528-1/"],"published_time":"2020-06-26T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15304","summary":"An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.31378,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md","https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md","https://github.com/AcademySoftwareFoundation/openexr/pull/727","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKDRVXORM2VLNHRLFKS3JHRABSHZ5W5M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SHYAKRAUEMYVCV7U5WLDRE2YFGSV5PIT/","https://security.gentoo.org/glsa/202107-27","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md","https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md","https://github.com/AcademySoftwareFoundation/openexr/pull/727","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKDRVXORM2VLNHRLFKS3JHRABSHZ5W5M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SHYAKRAUEMYVCV7U5WLDRE2YFGSV5PIT/","https://security.gentoo.org/glsa/202107-27"],"published_time":"2020-06-26T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15305","summary":"An issue was discovered in OpenEXR before 2.5.2. Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29766,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md","https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md","https://github.com/AcademySoftwareFoundation/openexr/pull/730","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKDRVXORM2VLNHRLFKS3JHRABSHZ5W5M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SHYAKRAUEMYVCV7U5WLDRE2YFGSV5PIT/","https://security.gentoo.org/glsa/202107-27","https://usn.ubuntu.com/4418-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md","https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md","https://github.com/AcademySoftwareFoundation/openexr/pull/730","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKDRVXORM2VLNHRLFKS3JHRABSHZ5W5M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SHYAKRAUEMYVCV7U5WLDRE2YFGSV5PIT/","https://security.gentoo.org/glsa/202107-27","https://usn.ubuntu.com/4418-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-06-26T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15306","summary":"An issue was discovered in OpenEXR before v2.5.2. Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0013,"ranking_epss":0.32489,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md","https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md","https://github.com/AcademySoftwareFoundation/openexr/pull/738","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKDRVXORM2VLNHRLFKS3JHRABSHZ5W5M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SHYAKRAUEMYVCV7U5WLDRE2YFGSV5PIT/","https://security.gentoo.org/glsa/202107-27","https://usn.ubuntu.com/4418-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md","https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md","https://github.com/AcademySoftwareFoundation/openexr/pull/738","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKDRVXORM2VLNHRLFKS3JHRABSHZ5W5M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SHYAKRAUEMYVCV7U5WLDRE2YFGSV5PIT/","https://security.gentoo.org/glsa/202107-27","https://usn.ubuntu.com/4418-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-06-26T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-15025","summary":"ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.4,"cvss_v4":null,"epss":0.03115,"ranking_epss":0.86852,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html","https://bugs.gentoo.org/729458","https://security.gentoo.org/glsa/202007-12","https://security.netapp.com/advisory/ntap-20200702-0002/","https://support.ntp.org/bin/view/Main/NtpBug3661","https://support.ntp.org/bin/view/Main/SecurityNotice#June_2020_ntp_4_2_8p15_NTP_Relea","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html","https://bugs.gentoo.org/729458","https://security.gentoo.org/glsa/202007-12","https://security.netapp.com/advisory/ntap-20200702-0002/","https://support.ntp.org/bin/view/Main/NtpBug3661","https://support.ntp.org/bin/view/Main/SecurityNotice#June_2020_ntp_4_2_8p15_NTP_Relea","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2020-06-24T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12862","summary":"An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.","cvss":4.3,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00168,"ranking_epss":0.37967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12863","summary":"An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.","cvss":4.3,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00168,"ranking_epss":0.37967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12864","summary":"An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.","cvss":4.3,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00239,"ranking_epss":0.47042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12865","summary":"A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.","cvss":8.0,"cvss_version":3.0,"cvss_v2":5.2,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00295,"ranking_epss":0.52857,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12866","summary":"A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.","cvss":5.7,"cvss_version":3.0,"cvss_v2":2.7,"cvss_v3":5.7,"cvss_v4":null,"epss":0.0025,"ranking_epss":0.48283,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12861","summary":"A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-080.","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.9,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00588,"ranking_epss":0.69171,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-24T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-4030","summary":"In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":3.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.11937,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-4031","summary":"In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00266,"ranking_epss":0.50173,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gwcq-hpq2-m74g","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gwcq-hpq2-m74g","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-4032","summary":"In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.","cvss":3.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.61147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3898-mc89-x2vc","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3898-mc89-x2vc","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-4033","summary":"In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth < 32 are affected. This is fixed in version 2.1.2.","cvss":3.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.43116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/0a98c450c58ec150e44781c89aa6f8e7e0f571f5","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7rhj-856w-82p8","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/0a98c450c58ec150e44781c89aa6f8e7e0f571f5","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7rhj-856w-82p8","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11096","summary":"In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00281,"ranking_epss":0.51569,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/b8beb55913471952f92770c90c372139d78c16c0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mjw7-3mq2-996x","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/b8beb55913471952f92770c90c372139d78c16c0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mjw7-3mq2-996x","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11097","summary":"In FreeRDP before version 2.1.2, an out of bounds read occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00179,"ranking_epss":0.39485,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/58a3122250d54de3a944c487776bcd4d1da4721e","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c8x2-c3c9-9r3f","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/58a3122250d54de3a944c487776bcd4d1da4721e","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c8x2-c3c9-9r3f","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11098","summary":"In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00227,"ranking_epss":0.45498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/c0fd449ec0870b050d350d6d844b1ea6dad4bc7d","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-jr57-f58x-hjmv","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/c0fd449ec0870b050d350d6d844b1ea6dad4bc7d","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-jr57-f58x-hjmv","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11099","summary":"In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00178,"ranking_epss":0.39344,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/6ade7b4cbfd71c54b3d724e8f2d6ac76a58e879a","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-977w-866x-4v5h","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/6ade7b4cbfd71c54b3d724e8f2d6ac76a58e879a","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-977w-866x-4v5h","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11095","summary":"In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.","cvss":3.5,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00243,"ranking_epss":0.476,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/733ee3208306b1ea32697b356c0215180fc3f049","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-563r-pvh7-4fw2","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","http://www.freerdp.com/2020/06/22/2_1_2-released","https://github.com/FreeRDP/FreeRDP/commit/733ee3208306b1ea32697b356c0215180fc3f049","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-563r-pvh7-4fw2","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/","https://usn.ubuntu.com/4481-1/"],"published_time":"2020-06-22T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14983","summary":"The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00603,"ranking_epss":0.69611,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html","https://github.com/chocolate-doom/chocolate-doom/issues/1293","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html","https://github.com/chocolate-doom/chocolate-doom/issues/1293"],"published_time":"2020-06-22T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8903","summary":"A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role \"roles/compute.osLogin\" to escalate privileges to root. Using their membership to the \"adm\" group, users with this role are able to read the DHCP XID from the systemd journal. Using the DHCP XID, it is then possible to set the IP address and hostname of the instance to any value, which is then stored in /etc/hosts. An attacker can then point metadata.google.internal to an arbitrary IP address and impersonate the GCE metadata server which make it is possible to instruct the OS Login PAM module to grant administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the \"adm\" user from the OS Login entry.","cvss":7.3,"cvss_version":4.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":7.3,"epss":0.00092,"ranking_epss":0.25897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html","https://cloud.google.com/support/bulletins/#gcp-2020-008","https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29","https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html","https://cloud.google.com/support/bulletins/#gcp-2020-008","https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29","https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"],"published_time":"2020-06-22T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8907","summary":"A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role \"roles/compute.osLogin\" to escalate privileges to root. Using their membership to the \"docker\" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the \"docker\" user from the OS Login entry.","cvss":9.3,"cvss_version":4.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":9.3,"epss":0.00086,"ranking_epss":0.24793,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html","https://cloud.google.com/support/bulletins/#gcp-2020-008","https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29","https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html","https://cloud.google.com/support/bulletins/#gcp-2020-008","https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29","https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"],"published_time":"2020-06-22T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8933","summary":"A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role \"roles/compute.osLogin\" to escalate privileges to root. Using the membership to the \"lxd\" group, an attacker can attach host devices and filesystems. Within an lxc container, it is possible to attach the host OS filesystem and modify /etc/sudoers to then gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the \"lxd\" user from the OS Login entry.","cvss":9.3,"cvss_version":4.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":9.3,"epss":0.00078,"ranking_epss":0.23307,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html","https://cloud.google.com/support/bulletins/#gcp-2020-008","https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29","https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html","https://cloud.google.com/support/bulletins/#gcp-2020-008","https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29","https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"],"published_time":"2020-06-22T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14954","summary":"Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.05784,"ranking_epss":0.90511,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html","http://www.mutt.org/","https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc","https://github.com/neomutt/neomutt/releases/tag/20200619","https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4","https://gitlab.com/muttmua/mutt/-/issues/248","https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFMEILCBKMZRRZDMUGWLVN4PQQ4VTAZE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3LXFVPTLK4PNHL6MPKJNJQJ25CH7GLQ/","https://security.gentoo.org/glsa/202007-57","https://usn.ubuntu.com/4403-1/","https://www.debian.org/security/2020/dsa-4707","https://www.debian.org/security/2020/dsa-4708","http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html","http://www.mutt.org/","https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc","https://github.com/neomutt/neomutt/releases/tag/20200619","https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4","https://gitlab.com/muttmua/mutt/-/issues/248","https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFMEILCBKMZRRZDMUGWLVN4PQQ4VTAZE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3LXFVPTLK4PNHL6MPKJNJQJ25CH7GLQ/","https://security.gentoo.org/glsa/202007-57","https://usn.ubuntu.com/4403-1/","https://www.debian.org/security/2020/dsa-4707","https://www.debian.org/security/2020/dsa-4708"],"published_time":"2020-06-21T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8165","summary":"A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.90128,"ranking_epss":0.9959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html","https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c","https://hackerone.com/reports/413388","https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html","https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/","https://www.debian.org/security/2020/dsa-4766","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html","https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c","https://hackerone.com/reports/413388","https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html","https://security.netapp.com/advisory/ntap-20250509-0002/","https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/","https://www.debian.org/security/2020/dsa-4766"],"published_time":"2020-06-19T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8164","summary":"A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07389,"ranking_epss":0.91745,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html","https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY","https://hackerone.com/reports/292797","https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html","https://www.debian.org/security/2020/dsa-4766","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html","https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY","https://hackerone.com/reports/292797","https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html","https://www.debian.org/security/2020/dsa-4766"],"published_time":"2020-06-19T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-9103","summary":"An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00674,"ranking_epss":0.7145,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html"],"published_time":"2020-06-18T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-9104","summary":"An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0067,"ranking_epss":0.71372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html"],"published_time":"2020-06-18T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14422","summary":"Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01172,"ranking_epss":0.78709,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html","https://bugs.python.org/issue41004","https://github.com/python/cpython/pull/20956","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCCZTAYZATTNSNEAXWA7U3HCO2OVQKT5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X36Y523UAZY5QFXZAAORNFY63HLBWX7N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/","https://security.gentoo.org/glsa/202008-01","https://security.netapp.com/advisory/ntap-20200724-0004/","https://usn.ubuntu.com/4428-1/","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html","https://bugs.python.org/issue41004","https://github.com/python/cpython/pull/20956","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCCZTAYZATTNSNEAXWA7U3HCO2OVQKT5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X36Y523UAZY5QFXZAAORNFY63HLBWX7N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/","https://security.gentoo.org/glsa/202008-01","https://security.netapp.com/advisory/ntap-20200724-0004/","https://usn.ubuntu.com/4428-1/","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2020-06-18T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-9108","summary":"An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00527,"ranking_epss":0.67173,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html"],"published_time":"2020-06-18T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-9109","summary":"An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0067,"ranking_epss":0.71372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git","http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/","https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html"],"published_time":"2020-06-18T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14416","summary":"In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.","cvss":4.2,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00091,"ranking_epss":0.25627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://bugzilla.suse.com/show_bug.cgi?id=1162002","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://bugzilla.suse.com/show_bug.cgi?id=1162002","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd"],"published_time":"2020-06-18T11:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8619","summary":"In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk (\"*\") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.","cvss":4.9,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.9,"cvss_v4":null,"epss":0.06931,"ranking_epss":0.91437,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8619","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNFTTYJ5JJJJ6QG3AHXJGDIIEYMDFWFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIOXMJX4N3LBKC65OXNBE52W4GAS7QEX/","https://security.netapp.com/advisory/ntap-20200625-0003/","https://usn.ubuntu.com/4399-1/","https://www.debian.org/security/2020/dsa-4752","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8619","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNFTTYJ5JJJJ6QG3AHXJGDIIEYMDFWFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIOXMJX4N3LBKC65OXNBE52W4GAS7QEX/","https://security.netapp.com/advisory/ntap-20200625-0003/","https://usn.ubuntu.com/4399-1/","https://www.debian.org/security/2020/dsa-4752"],"published_time":"2020-06-17T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8618","summary":"An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.","cvss":4.9,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.9,"cvss_v4":null,"epss":0.01297,"ranking_epss":0.79726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8618","https://security.netapp.com/advisory/ntap-20200625-0003/","https://usn.ubuntu.com/4399-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","https://kb.isc.org/docs/cve-2020-8618","https://security.netapp.com/advisory/ntap-20200625-0003/","https://usn.ubuntu.com/4399-1/"],"published_time":"2020-06-17T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14401","summary":"An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01613,"ranking_epss":0.81813,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/"],"published_time":"2020-06-17T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-21247","summary":"An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01477,"ranking_epss":0.8101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://github.com/LibVNC/libvncserver/issues/253","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://github.com/LibVNC/libvncserver/issues/253","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20839","summary":"libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04081,"ranking_epss":0.88571,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/","https://usn.ubuntu.com/4434-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/","https://usn.ubuntu.com/4434-1/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20840","summary":"An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02026,"ranking_epss":0.83815,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://usn.ubuntu.com/4434-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/","https://usn.ubuntu.com/4434-1/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14397","summary":"An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04438,"ranking_epss":0.89063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/38e98ee61d74f5f5ab4aa4c77146faad1962d6d0","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/","https://usn.ubuntu.com/4573-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/38e98ee61d74f5f5ab4aa4c77146faad1962d6d0","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/","https://usn.ubuntu.com/4573-1/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14398","summary":"An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02271,"ranking_epss":0.84671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/57433015f856cc12753378254ce4f1c78f5d9c7b","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://usn.ubuntu.com/4434-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf","https://github.com/LibVNC/libvncserver/commit/57433015f856cc12753378254ce4f1c78f5d9c7b","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://usn.ubuntu.com/4434-1/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14399","summary":"An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly \"no trust boundary crossed.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02462,"ranking_epss":0.85267,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://bugzilla.redhat.com/show_bug.cgi?id=1860354","https://github.com/LibVNC/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://bugzilla.redhat.com/show_bug.cgi?id=1860354","https://github.com/LibVNC/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14400","summary":"An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02477,"ranking_epss":0.85305,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://bugzilla.redhat.com/show_bug.cgi?id=1860361","https://github.com/LibVNC/libvncserver/commit/53073c8d7e232151ea2ecd8a1243124121e10e2d","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html","https://bugzilla.redhat.com/show_bug.cgi?id=1860361","https://github.com/LibVNC/libvncserver/commit/53073c8d7e232151ea2ecd8a1243124121e10e2d","https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13","https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html","https://usn.ubuntu.com/4434-1/"],"published_time":"2020-06-17T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0543","summary":"Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00481,"ranking_epss":0.65165,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/14/5","https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/","https://usn.ubuntu.com/4385-1/","https://usn.ubuntu.com/4387-1/","https://usn.ubuntu.com/4388-1/","https://usn.ubuntu.com/4389-1/","https://usn.ubuntu.com/4390-1/","https://usn.ubuntu.com/4391-1/","https://usn.ubuntu.com/4392-1/","https://usn.ubuntu.com/4393-1/","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html","http://www.openwall.com/lists/oss-security/2020/07/14/5","https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/","https://usn.ubuntu.com/4385-1/","https://usn.ubuntu.com/4387-1/","https://usn.ubuntu.com/4388-1/","https://usn.ubuntu.com/4389-1/","https://usn.ubuntu.com/4390-1/","https://usn.ubuntu.com/4391-1/","https://usn.ubuntu.com/4392-1/","https://usn.ubuntu.com/4393-1/","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html"],"published_time":"2020-06-15T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14093","summary":"Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.03861,"ranking_epss":0.88229,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html","http://www.mutt.org","https://bugs.gentoo.org/728300","https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01","https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html","https://security.gentoo.org/glsa/202007-57","https://usn.ubuntu.com/4401-1/","https://www.debian.org/security/2020/dsa-4707","https://www.debian.org/security/2020/dsa-4708","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html","http://www.mutt.org","https://bugs.gentoo.org/728300","https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01","https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html","https://security.gentoo.org/glsa/202007-57","https://usn.ubuntu.com/4401-1/","https://www.debian.org/security/2020/dsa-4707","https://www.debian.org/security/2020/dsa-4708"],"published_time":"2020-06-15T05:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-14004","summary":"An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00224,"ranking_epss":0.45147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html","http://www.openwall.com/lists/oss-security/2020/06/12/1","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004","https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master","https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6","https://github.com/Icinga/icinga2/releases","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html","http://www.openwall.com/lists/oss-security/2020/06/12/1","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004","https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master","https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6","https://github.com/Icinga/icinga2/releases"],"published_time":"2020-06-12T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10732","summary":"A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.","cvss":3.3,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11581,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732","https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d","https://github.com/google/kmsan/issues/76","https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a","https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/","https://security.netapp.com/advisory/ntap-20210129-0005/","https://twitter.com/grsecurity/status/1252558055629299712","https://usn.ubuntu.com/4411-1/","https://usn.ubuntu.com/4427-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://usn.ubuntu.com/4485-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732","https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d","https://github.com/google/kmsan/issues/76","https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a","https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/","https://security.netapp.com/advisory/ntap-20210129-0005/","https://twitter.com/grsecurity/status/1252558055629299712","https://usn.ubuntu.com/4411-1/","https://usn.ubuntu.com/4427-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://usn.ubuntu.com/4485-1/"],"published_time":"2020-06-12T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1269","summary":"An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00531,"ranking_epss":0.67307,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1269","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1269"],"published_time":"2020-06-09T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10757","summary":"A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00669,"ranking_epss":0.71345,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","https://bugzilla.redhat.com/show_bug.cgi?id=1842525","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/","https://security.netapp.com/advisory/ntap-20200702-0004/","https://usn.ubuntu.com/4426-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://usn.ubuntu.com/4483-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","https://www.openwall.com/lists/oss-security/2020/06/04/4","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","https://bugzilla.redhat.com/show_bug.cgi?id=1842525","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/","https://security.netapp.com/advisory/ntap-20200702-0004/","https://usn.ubuntu.com/4426-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://usn.ubuntu.com/4483-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","https://www.openwall.com/lists/oss-security/2020/06/04/4"],"published_time":"2020-06-09T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10761","summary":"An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.","cvss":5.0,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00841,"ranking_epss":0.74761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200731-0001/","https://usn.ubuntu.com/4467-1/","https://www.openwall.com/lists/oss-security/2020/06/09/1","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200731-0001/","https://usn.ubuntu.com/4467-1/","https://www.openwall.com/lists/oss-security/2020/06/09/1"],"published_time":"2020-06-09T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13962","summary":"Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected, regardless of the Qt version.)","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01567,"ranking_epss":0.81549,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html","https://bugreports.qt.io/browse/QTBUG-83450","https://github.com/mumble-voip/mumble/issues/3679","https://github.com/mumble-voip/mumble/pull/4032","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/","https://security.gentoo.org/glsa/202007-18","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html","https://bugreports.qt.io/browse/QTBUG-83450","https://github.com/mumble-voip/mumble/issues/3679","https://github.com/mumble-voip/mumble/pull/4032","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/","https://security.gentoo.org/glsa/202007-18"],"published_time":"2020-06-09T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13844","summary":"Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka \"straight-line speculation.\"","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00137,"ranking_epss":0.33498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html","https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability","https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation","https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions","https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html","http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html","https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability","https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation","https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions","https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html"],"published_time":"2020-06-08T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13696","summary":"An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.","cvss":4.4,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13254,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00013.html","http://www.openwall.com/lists/oss-security/2020/06/04/6","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-13696","https://git.linuxtv.org/xawtv3.git/commit/?id=31f31f9cbaee7be806cba38e0ff5431bd44b20a3","https://git.linuxtv.org/xawtv3.git/commit/?id=36dc44e68e5886339b4a0fbe3f404fb1a4fd2292","https://git.linuxtv.org/xawtv3.git/commit/?id=8e3feea862db68d3ca0886f46cd99fab45d2db7c","https://lists.debian.org/debian-lts-announce/2020/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELOXU5LXQSQOXX64D4BICZV3TQWOBXHC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7XWAO7W2DGA6M52JGK2TDWUGF62Q2KY/","https://usn.ubuntu.com/4518-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00013.html","http://www.openwall.com/lists/oss-security/2020/06/04/6","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-13696","https://git.linuxtv.org/xawtv3.git/commit/?id=31f31f9cbaee7be806cba38e0ff5431bd44b20a3","https://git.linuxtv.org/xawtv3.git/commit/?id=36dc44e68e5886339b4a0fbe3f404fb1a4fd2292","https://git.linuxtv.org/xawtv3.git/commit/?id=8e3feea862db68d3ca0886f46cd99fab45d2db7c","https://lists.debian.org/debian-lts-announce/2020/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELOXU5LXQSQOXX64D4BICZV3TQWOBXHC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7XWAO7W2DGA6M52JGK2TDWUGF62Q2KY/","https://usn.ubuntu.com/4518-1/"],"published_time":"2020-06-08T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12803","summary":"ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00459,"ranking_epss":0.64085,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQIBAKXD7VO5IGBD7ZMH3GGBNR5R2IOA/","https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12803","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQIBAKXD7VO5IGBD7ZMH3GGBNR5R2IOA/","https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12803"],"published_time":"2020-06-08T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12802","summary":"LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00401,"ranking_epss":0.60788,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQIBAKXD7VO5IGBD7ZMH3GGBNR5R2IOA/","https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQIBAKXD7VO5IGBD7ZMH3GGBNR5R2IOA/","https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802"],"published_time":"2020-06-08T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12723","summary":"regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00191,"ranking_epss":0.40946,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/Perl/perl5/issues/16947","https://github.com/Perl/perl5/issues/17743","https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","https://security.gentoo.org/glsa/202006-03","https://security.netapp.com/advisory/ntap-20200611-0001/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/Perl/perl5/issues/16947","https://github.com/Perl/perl5/issues/17743","https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","https://security.gentoo.org/glsa/202006-03","https://security.netapp.com/advisory/ntap-20200611-0001/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-06-05T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10543","summary":"Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.","cvss":8.2,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":8.2,"cvss_v4":null,"epss":0.04289,"ranking_epss":0.88871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","https://security.gentoo.org/glsa/202006-03","https://security.netapp.com/advisory/ntap-20200611-0001/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","https://security.gentoo.org/glsa/202006-03","https://security.netapp.com/advisory/ntap-20200611-0001/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-06-05T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10878","summary":"Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.","cvss":8.6,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00111,"ranking_epss":0.29524,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","https://security.gentoo.org/glsa/202006-03","https://security.netapp.com/advisory/ntap-20200611-0001/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","https://security.gentoo.org/glsa/202006-03","https://security.netapp.com/advisory/ntap-20200611-0001/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-06-05T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13800","summary":"ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.","cvss":6.0,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00104,"ranking_epss":0.28419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","https://cve.openeuler.org/cve#/CVEInfo/CVE-2020-13800","https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00825.html","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200717-0001/","https://usn.ubuntu.com/4467-1/","https://www.openwall.com/lists/oss-security/2020/06/04/2","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","https://cve.openeuler.org/cve#/CVEInfo/CVE-2020-13800","https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00825.html","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200717-0001/","https://usn.ubuntu.com/4467-1/","https://www.openwall.com/lists/oss-security/2020/06/04/2"],"published_time":"2020-06-04T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13817","summary":"ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.","cvss":5.9,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00348,"ranking_epss":0.57374,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html","http://support.ntp.org/bin/view/Main/NtpBug3596","https://bugs.ntp.org/show_bug.cgi?id=3596","https://security.gentoo.org/glsa/202007-12","https://security.netapp.com/advisory/ntap-20200625-0004/","https://www.oracle.com/security-alerts/cpujan2022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html","http://support.ntp.org/bin/view/Main/NtpBug3596","https://bugs.ntp.org/show_bug.cgi?id=3596","https://security.gentoo.org/glsa/202007-12","https://security.netapp.com/advisory/ntap-20200625-0004/","https://www.oracle.com/security-alerts/cpujan2022.html"],"published_time":"2020-06-04T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11080","summary":"In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.","cvss":3.7,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00741,"ranking_epss":0.73,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html","https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090","https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394","https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr","https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/","https://www.debian.org/security/2020/dsa-4696","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html","https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090","https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394","https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr","https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/","https://www.debian.org/security/2020/dsa-4696","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-06-03T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6493","summary":"Use after free in WebAuthentication in Google Chrome prior to 83.0.4103.97 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.01637,"ranking_epss":0.8196,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1082105","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1082105","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-06-03T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6494","summary":"Incorrect security UI in payments in Google Chrome on Android prior to 83.0.4103.97 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00498,"ranking_epss":0.65912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1083972","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1083972","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-06-03T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6495","summary":"Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00515,"ranking_epss":0.66637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1072116","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1072116","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-06-03T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6496","summary":"Use after free in payments in Google Chrome on MacOS prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01318,"ranking_epss":0.79894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1085990","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html","https://crbug.com/1085990","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-06-03T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13379","summary":"The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.","cvss":8.2,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":8.2,"cvss_v4":null,"epss":0.92845,"ranking_epss":0.99766,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html","http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html","http://www.openwall.com/lists/oss-security/2020/06/03/4","http://www.openwall.com/lists/oss-security/2020/06/09/2","https://community.grafana.com/t/grafana-7-0-2-and-6-7-4-security-update/31408","https://community.grafana.com/t/release-notes-v6-7-x/27119","https://community.grafana.com/t/release-notes-v7-0-x/29381","https://grafana.com/blog/2020/06/03/grafana-6.7.4-and-7.0.2-released-with-important-security-fix/","https://lists.apache.org/thread.html/r0928ee574281f8b6156e0a6d0291bfc27100a9dd3f9b0177ece24ae4%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/r093b405a49fd31efa0d949ac1a887101af1ca95652a66094194ed933%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/r40f0a97b6765de6b8938bc212ee9dfb5101e9efa48bcbbdec02b2a60%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/r6670a6c29044bcb77d4e5d165b5bd13fffe37b84caa5d6471b13b3a2%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/r6bb57124a21bb638f552d81650c66684e70fc1ff9f40b6a8840171cd%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/r984c3b42a500f5a6a89fbee436b9432fada5dc27ebab04910aafe4da%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/rad99b06d7360a5cf6e394afb313f8901dcd4cb777aee9c9197b3b23d%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/rba0247a27be78bd14046724098462d058a9969400a82344b3007cf90%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/rd0fd283e3844b9c54cd5ecc92d966f96d3f4318815bbf3ac41f9c820%40%3Ccommits.ambari.apache.org%3E","https://lists.apache.org/thread.html/re75f59639f3bc1d14c7ab362bc4485ade84f3c6a3c1a03200c20fe13%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/re7c4b251b52f49ba6ef752b829bca9565faaf93d03206b1db6644d31%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/rff71126fa7d9f572baafb9be44078ad409c85d2c0f3e26664f1ef5a2%40%3Cdev.ambari.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEKSZ6GE4EDOFZ23NGYWOCMD6O4JF5SO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O2KSCCGKNEENZN3DW7TSPFBBUZH3YZXZ/","https://mostwanted002.cf/post/grafanados/","https://rhynorater.github.io/CVE-2020-13379-Write-Up","https://security.netapp.com/advisory/ntap-20200608-0006/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html","http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html","http://www.openwall.com/lists/oss-security/2020/06/03/4","http://www.openwall.com/lists/oss-security/2020/06/09/2","https://community.grafana.com/t/grafana-7-0-2-and-6-7-4-security-update/31408","https://community.grafana.com/t/release-notes-v6-7-x/27119","https://community.grafana.com/t/release-notes-v7-0-x/29381","https://grafana.com/blog/2020/06/03/grafana-6.7.4-and-7.0.2-released-with-important-security-fix/","https://lists.apache.org/thread.html/r0928ee574281f8b6156e0a6d0291bfc27100a9dd3f9b0177ece24ae4%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/r093b405a49fd31efa0d949ac1a887101af1ca95652a66094194ed933%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/r40f0a97b6765de6b8938bc212ee9dfb5101e9efa48bcbbdec02b2a60%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/r6670a6c29044bcb77d4e5d165b5bd13fffe37b84caa5d6471b13b3a2%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/r6bb57124a21bb638f552d81650c66684e70fc1ff9f40b6a8840171cd%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/r984c3b42a500f5a6a89fbee436b9432fada5dc27ebab04910aafe4da%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/rad99b06d7360a5cf6e394afb313f8901dcd4cb777aee9c9197b3b23d%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/rba0247a27be78bd14046724098462d058a9969400a82344b3007cf90%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/rd0fd283e3844b9c54cd5ecc92d966f96d3f4318815bbf3ac41f9c820%40%3Ccommits.ambari.apache.org%3E","https://lists.apache.org/thread.html/re75f59639f3bc1d14c7ab362bc4485ade84f3c6a3c1a03200c20fe13%40%3Cissues.ambari.apache.org%3E","https://lists.apache.org/thread.html/re7c4b251b52f49ba6ef752b829bca9565faaf93d03206b1db6644d31%40%3Cdev.ambari.apache.org%3E","https://lists.apache.org/thread.html/rff71126fa7d9f572baafb9be44078ad409c85d2c0f3e26664f1ef5a2%40%3Cdev.ambari.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEKSZ6GE4EDOFZ23NGYWOCMD6O4JF5SO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O2KSCCGKNEENZN3DW7TSPFBBUZH3YZXZ/","https://mostwanted002.cf/post/grafanados/","https://rhynorater.github.io/CVE-2020-13379-Write-Up","https://security.netapp.com/advisory/ntap-20200608-0006/"],"published_time":"2020-06-03T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20810","summary":"go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00069,"ranking_epss":0.21119,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983","https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html","https://usn.ubuntu.com/4427-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983","https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html","https://usn.ubuntu.com/4427-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/"],"published_time":"2020-06-03T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13659","summary":"address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.","cvss":2.5,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":2.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10774,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","http://www.openwall.com/lists/oss-security/2020/06/01/3","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg07313.html","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200608-0007/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","http://www.openwall.com/lists/oss-security/2020/06/01/3","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg07313.html","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200608-0007/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728"],"published_time":"2020-06-02T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12867","summary":"A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWUVCHURVGGYBEUOBA4PLSNXJVBKHJYJ/","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html","https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html","https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read","https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWUVCHURVGGYBEUOBA4PLSNXJVBKHJYJ/","https://securitylab.github.com/advisories/GHSL-2020-075-libsane","https://usn.ubuntu.com/4470-1/"],"published_time":"2020-06-01T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11089","summary":"In FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0.","cvss":3.7,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00229,"ranking_epss":0.45753,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/6b485b146a1b9d6ce72dfd7b5f36456c166e7a16","https://github.com/FreeRDP/FreeRDP/commit/795842f4096501fcefc1a7f535ccc8132feb31d7","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hfc7-c5gv-8c2h","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/6b485b146a1b9d6ce72dfd7b5f36456c166e7a16","https://github.com/FreeRDP/FreeRDP/commit/795842f4096501fcefc1a7f535ccc8132feb31d7","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hfc7-c5gv-8c2h","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11040","summary":"In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0.","cvss":2.2,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":2.2,"cvss_v4":null,"epss":0.00117,"ranking_epss":0.30525,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x4wq-m7c9-rjgr","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x4wq-m7c9-rjgr","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11043","summary":"In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.","cvss":2.2,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":2.2,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.33125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5mr4-28w3-rc84","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5mr4-28w3-rc84","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11085","summary":"In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.","cvss":2.6,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":2.6,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30854,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/b73143cf7ee5fe4cdabcbf56908aa15d8a883821","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2j4w-v45m-95hf","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/b73143cf7ee5fe4cdabcbf56908aa15d8a883821","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2j4w-v45m-95hf","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11086","summary":"In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.","cvss":3.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":3.1,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11087","summary":"In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.","cvss":3.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":3.1,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11088","summary":"In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.","cvss":3.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":3.1,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11019","summary":"In FreeRDP less than or equal to 2.0.0, when running with logger set to \"WLOG_TRACE\", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00376,"ranking_epss":0.59208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11038","summary":"In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0.","cvss":6.9,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":6.9,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40133,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11039","summary":"In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0.","cvss":8.0,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40187,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11041","summary":"In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.","cvss":2.2,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":2.2,"cvss_v4":null,"epss":0.00173,"ranking_epss":0.3871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11018","summary":"In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00222,"ranking_epss":0.44917,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11017","summary":"In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.46285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"],"published_time":"2020-05-29T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13362","summary":"In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.","cvss":3.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.2,"cvss_v4":null,"epss":0.00098,"ranking_epss":0.26842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","http://www.openwall.com/lists/oss-security/2020/05/28/2","https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html","https://security-tracker.debian.org/tracker/CVE-2020-13362","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200608-0003/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","http://www.openwall.com/lists/oss-security/2020/05/28/2","https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html","https://security-tracker.debian.org/tracker/CVE-2020-13362","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200608-0003/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728"],"published_time":"2020-05-28T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20807","summary":"In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00206,"ranking_epss":0.42921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html","http://seclists.org/fulldisclosure/2020/Jul/24","https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075","https://github.com/vim/vim/releases/tag/v8.1.0881","https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html","https://support.apple.com/kb/HT211289","https://usn.ubuntu.com/4582-1/","https://www.starwindsoftware.com/security/sw-20220812-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html","http://seclists.org/fulldisclosure/2020/Jul/24","https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075","https://github.com/vim/vim/releases/tag/v8.1.0881","https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html","https://support.apple.com/kb/HT211289","https://usn.ubuntu.com/4582-1/","https://www.starwindsoftware.com/security/sw-20220812-0003/"],"published_time":"2020-05-28T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13361","summary":"In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.","cvss":3.9,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":3.9,"cvss_v4":null,"epss":0.00098,"ranking_epss":0.26842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","http://www.openwall.com/lists/oss-security/2020/05/28/1","https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html","https://security-tracker.debian.org/tracker/CVE-2020-13361","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200608-0003/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html","http://www.openwall.com/lists/oss-security/2020/05/28/1","https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html","https://security-tracker.debian.org/tracker/CVE-2020-13361","https://security.gentoo.org/glsa/202011-09","https://security.netapp.com/advisory/ntap-20200608-0003/","https://usn.ubuntu.com/4467-1/","https://www.debian.org/security/2020/dsa-4728"],"published_time":"2020-05-28T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13614","summary":"An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.6883,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00010.html","https://github.com/axel-download-accelerator/axel/issues/262","https://github.com/axel-download-accelerator/axel/releases/tag/v2.17.8","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPZUQSDGV5XDBJGHBWBHWJIBE47Q4QIB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S3ECAKIZA2TGBYLUQTLGRMXUFIOGRHG3/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00010.html","https://github.com/axel-download-accelerator/axel/issues/262","https://github.com/axel-download-accelerator/axel/releases/tag/v2.17.8","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPZUQSDGV5XDBJGHBWBHWJIBE47Q4QIB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S3ECAKIZA2TGBYLUQTLGRMXUFIOGRHG3/"],"published_time":"2020-05-26T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6831","summary":"A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.06267,"ranking_epss":0.90946,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html","http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1632241","https://security.gentoo.org/glsa/202005-03","https://security.gentoo.org/glsa/202005-04","https://usn.ubuntu.com/4373-1/","https://www.debian.org/security/2020/dsa-4714","https://www.mozilla.org/security/advisories/mfsa2020-16/","https://www.mozilla.org/security/advisories/mfsa2020-17/","https://www.mozilla.org/security/advisories/mfsa2020-18/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html","http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1632241","https://security.gentoo.org/glsa/202005-03","https://security.gentoo.org/glsa/202005-04","https://usn.ubuntu.com/4373-1/","https://www.debian.org/security/2020/dsa-4714","https://www.mozilla.org/security/advisories/mfsa2020-16/","https://www.mozilla.org/security/advisories/mfsa2020-17/","https://www.mozilla.org/security/advisories/mfsa2020-18/"],"published_time":"2020-05-26T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13396","summary":"An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.","cvss":7.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00501,"ranking_epss":0.6605,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc","https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69","https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc","https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69","https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-22T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13397","summary":"An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00099,"ranking_epss":0.27564,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69","https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8","https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69","https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8","https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-22T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13398","summary":"An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.","cvss":8.3,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.3,"cvss_v4":null,"epss":0.00455,"ranking_epss":0.63904,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8305349a943c68b1bc8c158f431dc607655aadea","https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69","https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commit/8305349a943c68b1bc8c158f431dc607655aadea","https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69","https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-22T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10711","summary":"A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.05438,"ranking_epss":0.90193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4411-1/","https://usn.ubuntu.com/4412-1/","https://usn.ubuntu.com/4413-1/","https://usn.ubuntu.com/4414-1/","https://usn.ubuntu.com/4419-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","https://www.openwall.com/lists/oss-security/2020/05/12/2","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4411-1/","https://usn.ubuntu.com/4412-1/","https://usn.ubuntu.com/4413-1/","https://usn.ubuntu.com/4414-1/","https://usn.ubuntu.com/4419-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","https://www.openwall.com/lists/oss-security/2020/05/12/2"],"published_time":"2020-05-22T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11077","summary":"In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.","cvss":6.8,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00821,"ranking_epss":0.74439,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html","https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22","https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm","https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html","https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22","https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm","https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/"],"published_time":"2020-05-22T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12693","summary":"Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00632,"ranking_epss":0.70382,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html","https://lists.debian.org/debian-lts-announce/2022/01/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNL5E5SK4WP6M3DKU4IKW2NPQD2XTZ4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3RGQB3EWDLOLTSPAJPPWZEPQK3O3AUH/","https://lists.schedmd.com/pipermail/slurm-announce/2020/000036.html","https://www.debian.org/security/2021/dsa-4841","https://www.schedmd.com/news.php?id=236","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html","https://lists.debian.org/debian-lts-announce/2022/01/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNL5E5SK4WP6M3DKU4IKW2NPQD2XTZ4Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3RGQB3EWDLOLTSPAJPPWZEPQK3O3AUH/","https://lists.schedmd.com/pipermail/slurm-announce/2020/000036.html","https://www.debian.org/security/2021/dsa-4841","https://www.schedmd.com/news.php?id=236"],"published_time":"2020-05-21T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13113","summary":"An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.","cvss":8.2,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00696,"ranking_epss":0.71961,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/commit/ec412aa4583ad71ecabb967d3c77162760169d1f","https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4396-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/commit/ec412aa4583ad71ecabb967d3c77162760169d1f","https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4396-1/"],"published_time":"2020-05-21T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13112","summary":"An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.","cvss":9.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00978,"ranking_epss":0.76771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/commit/435e21f05001fb03f9f186fa7cbc69454afd00d1","https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4396-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/commit/435e21f05001fb03f9f186fa7cbc69454afd00d1","https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4396-1/"],"published_time":"2020-05-21T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13114","summary":"An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00774,"ranking_epss":0.7364,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/commit/e6a38a1a23ba94d139b1fa2cd4519fdcfe3c9bab","https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4396-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/commit/e6a38a1a23ba94d139b1fa2cd4519fdcfe3c9bab","https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4396-1/"],"published_time":"2020-05-21T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6487","summary":"Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00694,"ranking_epss":0.71909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/539938","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/539938","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6488","summary":"Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00608,"ranking_epss":0.6974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1044277","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1044277","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6489","summary":"Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01041,"ranking_epss":0.77475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1050756","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1050756","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6490","summary":"Insufficient data validation in loader in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01041,"ranking_epss":0.77475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1035887","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1035887","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6491","summary":"Insufficient data validation in site information in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted domain name.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00913,"ranking_epss":0.75914,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1050011","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1050011","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6479","summary":"Inappropriate implementation in sharing in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00913,"ranking_epss":0.75914,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1041749","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1041749","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6480","summary":"Insufficient policy enforcement in enterprise in Google Chrome prior to 83.0.4103.61 allowed a local attacker to bypass navigation restrictions via UI actions.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.65812,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1054966","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1054966","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6481","summary":"Insufficient policy enforcement in URL formatting in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to perform domain spoofing via a crafted domain name.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01409,"ranking_epss":0.8052,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1068531","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1068531","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6482","summary":"Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00582,"ranking_epss":0.68972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/795595","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/795595","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6483","summary":"Insufficient policy enforcement in payments in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00694,"ranking_epss":0.71909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/966507","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/966507","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6484","summary":"Insufficient data validation in ChromeDriver in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted request.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00608,"ranking_epss":0.6974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1045787","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1045787","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6485","summary":"Insufficient data validation in media router in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00626,"ranking_epss":0.70255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1047285","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1047285","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6486","summary":"Insufficient policy enforcement in navigations in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00968,"ranking_epss":0.76642,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1055524","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1055524","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6471","summary":"Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00856,"ranking_epss":0.75013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1059577","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1059577","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6472","summary":"Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory or disk via a crafted Chrome Extension.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00889,"ranking_epss":0.75553,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1064519","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1064519","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6473","summary":"Insufficient policy enforcement in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01451,"ranking_epss":0.80817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1049510","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1049510","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6474","summary":"Use after free in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02073,"ranking_epss":0.83978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1059533","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1059533","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6475","summary":"Incorrect implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01409,"ranking_epss":0.8052,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1020026","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1020026","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6476","summary":"Insufficient policy enforcement in tab strip in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00582,"ranking_epss":0.68972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1035315","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1035315","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6477","summary":"Inappropriate implementation in installer in Google Chrome on OS X prior to 83.0.4103.61 allowed a local attacker to perform privilege escalation via a crafted file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.0867,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/946156","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/946156","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6478","summary":"Inappropriate implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00913,"ranking_epss":0.75914,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1037730","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1037730","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6463","summary":"Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03747,"ranking_epss":0.88033,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html","https://crbug.com/1065186","https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202007-60","https://security.gentoo.org/glsa/202007-64","https://usn.ubuntu.com/4443-1/","https://www.debian.org/security/2020/dsa-4714","https://www.debian.org/security/2020/dsa-4736","https://www.debian.org/security/2020/dsa-4740","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html","https://crbug.com/1065186","https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202007-60","https://security.gentoo.org/glsa/202007-64","https://usn.ubuntu.com/4443-1/","https://www.debian.org/security/2020/dsa-4714","https://www.debian.org/security/2020/dsa-4736","https://www.debian.org/security/2020/dsa-4740"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6464","summary":"Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01373,"ranking_epss":0.8026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html","https://crbug.com/1071059","https://security.gentoo.org/glsa/202005-13","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html","https://crbug.com/1071059","https://security.gentoo.org/glsa/202005-13","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6465","summary":"Use after free in reader mode in Google Chrome on Android prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.01747,"ranking_epss":0.82578,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1073015","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1073015","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6466","summary":"Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.01467,"ranking_epss":0.80938,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1074706","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1074706","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6467","summary":"Use after free in WebRTC in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02045,"ranking_epss":0.83882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1068084","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1068084","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6468","summary":"Type confusion in V8 in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.42466,"ranking_epss":0.9747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1076708","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1076708","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6469","summary":"Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.","cvss":9.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00702,"ranking_epss":0.72094,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1067382","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1067382","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6470","summary":"Insufficient validation of untrusted input in clipboard in Google Chrome prior to 83.0.4103.61 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via crafted clipboard contents.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.01159,"ranking_epss":0.78608,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1065761","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html","https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html","https://crbug.com/1065761","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/","https://security.gentoo.org/glsa/202006-02","https://security.gentoo.org/glsa/202101-30","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-05-21T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13249","summary":"libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00702,"ranking_epss":0.72095,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://github.com/mariadb-corporation/mariadb-connector-c/commit/2759b87d72926b7c9b5426437a7c8dd15ff57945","https://github.com/mariadb-corporation/mariadb-connector-c/compare/v3.1.7...v3.1.8","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://github.com/mariadb-corporation/mariadb-connector-c/commit/2759b87d72926b7c9b5426437a7c8dd15ff57945","https://github.com/mariadb-corporation/mariadb-connector-c/compare/v3.1.7...v3.1.8","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"],"published_time":"2020-05-20T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9484","summary":"When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter=\"null\" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.93325,"ranking_epss":0.99811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html","http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html","http://seclists.org/fulldisclosure/2020/Jun/6","http://www.openwall.com/lists/oss-security/2021/03/01/2","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/","https://security.gentoo.org/glsa/202006-21","https://security.netapp.com/advisory/ntap-20200528-0005/","https://usn.ubuntu.com/4448-1/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html","http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html","http://seclists.org/fulldisclosure/2020/Jun/6","http://www.openwall.com/lists/oss-security/2021/03/01/2","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/","https://security.gentoo.org/glsa/202006-21","https://security.netapp.com/advisory/ntap-20200528-0005/","https://usn.ubuntu.com/4448-1/","https://usn.ubuntu.com/4596-1/","https://www.debian.org/security/2020/dsa-4727","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-05-20T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10725","summary":"A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.","cvss":7.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00606,"ranking_epss":0.69688,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=270","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=270","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2020-05-20T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10726","summary":"A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.","cvss":6.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.29607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=271","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10726","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=271","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10726","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2020-05-20T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13164","summary":"In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01829,"ranking_epss":0.82942,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5UOISPQTRCZGQLKBVXEDL72AEXEHS425/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNV3EYL4JBWCR22TJO3PH7ADUVS5RWSU/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-08.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5UOISPQTRCZGQLKBVXEDL72AEXEHS425/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNV3EYL4JBWCR22TJO3PH7ADUVS5RWSU/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-08.html"],"published_time":"2020-05-19T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10722","summary":"A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.","cvss":5.1,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00137,"ranking_epss":0.33458,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=267","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://usn.ubuntu.com/4362-1/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=267","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://usn.ubuntu.com/4362-1/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-05-19T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10723","summary":"A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.","cvss":5.1,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00137,"ranking_epss":0.33458,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=268","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://usn.ubuntu.com/4362-1/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html","https://bugs.dpdk.org/show_bug.cgi?id=268","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/","https://usn.ubuntu.com/4362-1/","https://www.openwall.com/lists/oss-security/2020/05/18/2","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-05-19T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10995","summary":"PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00091,"ranking_epss":0.25576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html","http://www.nxnsattack.com","https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/","https://www.debian.org/security/2020/dsa-4691","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html","http://www.nxnsattack.com","https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/","https://www.debian.org/security/2020/dsa-4691"],"published_time":"2020-05-19T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10135","summary":"Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.","cvss":5.4,"cvss_version":3.0,"cvss_v2":4.8,"cvss_v3":5.4,"cvss_v4":null,"epss":0.20195,"ranking_epss":0.95515,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html","http://seclists.org/fulldisclosure/2020/Jun/5","https://francozappa.github.io/about-bias/","https://kb.cert.org/vuls/id/647177/","https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html","http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html","http://seclists.org/fulldisclosure/2020/Jun/5","https://francozappa.github.io/about-bias/","https://kb.cert.org/vuls/id/647177/","https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/"],"published_time":"2020-05-19T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12244","summary":"An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26153,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html","http://www.openwall.com/lists/oss-security/2020/05/19/3","https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/","https://www.debian.org/security/2020/dsa-4691","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html","http://www.openwall.com/lists/oss-security/2020/05/19/3","https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/","https://www.debian.org/security/2020/dsa-4691"],"published_time":"2020-05-19T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12662","summary":"Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an \"NXNSAttack\" issue. This is triggered by random subdomains in the NSDNAME in NS records.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.15507,"ranking_epss":0.9468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html","http://www.nxnsattack.com","http://www.openwall.com/lists/oss-security/2020/05/19/5","https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F5NFROI2OMCZLYRTCNGHGO3TUD32LCIQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJ42N2HBZ3DXMSEC56SWIIOFQGOS5M7I/","https://nlnetlabs.nl/downloads/unbound/CVE-2020-12662_2020-12663.txt","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:19.unbound.asc","https://security.netapp.com/advisory/ntap-20200702-0006/","https://usn.ubuntu.com/4374-1/","https://www.debian.org/security/2020/dsa-4694","https://www.synology.com/security/advisory/Synology_SA_20_12","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html","http://www.nxnsattack.com","http://www.openwall.com/lists/oss-security/2020/05/19/5","https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F5NFROI2OMCZLYRTCNGHGO3TUD32LCIQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJ42N2HBZ3DXMSEC56SWIIOFQGOS5M7I/","https://nlnetlabs.nl/downloads/unbound/CVE-2020-12662_2020-12663.txt","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:19.unbound.asc","https://security.netapp.com/advisory/ntap-20200702-0006/","https://usn.ubuntu.com/4374-1/","https://www.debian.org/security/2020/dsa-4694","https://www.synology.com/security/advisory/Synology_SA_20_12"],"published_time":"2020-05-19T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12663","summary":"Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09083,"ranking_epss":0.92668,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html","http://www.openwall.com/lists/oss-security/2020/05/19/5","https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F5NFROI2OMCZLYRTCNGHGO3TUD32LCIQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJ42N2HBZ3DXMSEC56SWIIOFQGOS5M7I/","https://nlnetlabs.nl/downloads/unbound/CVE-2020-12662_2020-12663.txt","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:19.unbound.asc","https://usn.ubuntu.com/4374-1/","https://www.debian.org/security/2020/dsa-4694","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html","http://www.openwall.com/lists/oss-security/2020/05/19/5","https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F5NFROI2OMCZLYRTCNGHGO3TUD32LCIQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJ42N2HBZ3DXMSEC56SWIIOFQGOS5M7I/","https://nlnetlabs.nl/downloads/unbound/CVE-2020-12662_2020-12663.txt","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:19.unbound.asc","https://usn.ubuntu.com/4374-1/","https://www.debian.org/security/2020/dsa-4694"],"published_time":"2020-05-19T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8617","summary":"Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.92629,"ranking_epss":0.99746,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html","http://www.openwall.com/lists/oss-security/2020/05/19/4","https://kb.isc.org/docs/cve-2020-8617","https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/","https://security.netapp.com/advisory/ntap-20200522-0002/","https://usn.ubuntu.com/4365-1/","https://usn.ubuntu.com/4365-2/","https://www.debian.org/security/2020/dsa-4689","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html","http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html","http://www.openwall.com/lists/oss-security/2020/05/19/4","https://kb.isc.org/docs/cve-2020-8617","https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/","https://security.netapp.com/advisory/ntap-20200522-0002/","https://usn.ubuntu.com/4365-1/","https://usn.ubuntu.com/4365-2/","https://www.debian.org/security/2020/dsa-4689"],"published_time":"2020-05-19T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-13143","summary":"gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03265,"ranking_epss":0.87169,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=d126cf46f829d146dde3e6a8963e095ac6cfcd1c","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4411-1/","https://usn.ubuntu.com/4412-1/","https://usn.ubuntu.com/4413-1/","https://usn.ubuntu.com/4414-1/","https://usn.ubuntu.com/4419-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","https://www.spinics.net/lists/linux-usb/msg194331.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=d126cf46f829d146dde3e6a8963e095ac6cfcd1c","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4411-1/","https://usn.ubuntu.com/4412-1/","https://usn.ubuntu.com/4413-1/","https://usn.ubuntu.com/4414-1/","https://usn.ubuntu.com/4419-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","https://www.spinics.net/lists/linux-usb/msg194331.html"],"published_time":"2020-05-18T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12801","summary":"If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00185,"ranking_epss":0.40217,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801"],"published_time":"2020-05-18T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12888","summary":"The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26425,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://www.openwall.com/lists/oss-security/2020/05/19/6","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBEHRQQZTKJTPQFPY3JAO7MQ4JAFEQNW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXGMJHWTMQI34NJZ4BHL3ZVF264AWBF2/","https://lore.kernel.org/kvm/158871401328.15589.17598154478222071285.stgit%40gimli.home/","https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit%40gimli.home/","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://www.openwall.com/lists/oss-security/2020/05/19/6","https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBEHRQQZTKJTPQFPY3JAO7MQ4JAFEQNW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXGMJHWTMQI34NJZ4BHL3ZVF264AWBF2/","https://lore.kernel.org/kvm/158871401328.15589.17598154478222071285.stgit%40gimli.home/","https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit%40gimli.home/","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/"],"published_time":"2020-05-15T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11524","summary":"libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.","cvss":6.6,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00636,"ranking_epss":0.70495,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw","https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf","https://usn.ubuntu.com/4379-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw","https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf","https://usn.ubuntu.com/4379-1/"],"published_time":"2020-05-15T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11525","summary":"libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.","cvss":2.2,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":2.2,"cvss_v4":null,"epss":0.02215,"ranking_epss":0.84498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-15T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11526","summary":"libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.","cvss":2.2,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":2.2,"cvss_v4":null,"epss":0.00243,"ranking_epss":0.47631,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-15T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11521","summary":"libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.","cvss":6.6,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0139,"ranking_epss":0.80389,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-15T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11522","summary":"libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01047,"ranking_epss":0.77537,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-15T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11523","summary":"libfreerdp/gdi/region.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Integer Overflow.","cvss":6.6,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0139,"ranking_epss":0.80389,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","https://github.com/FreeRDP/FreeRDP/commits/master","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42","https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html","https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf","https://usn.ubuntu.com/4379-1/","https://usn.ubuntu.com/4382-1/"],"published_time":"2020-05-15T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0093","summary":"In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132","cvss":5.0,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39334,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html","https://security.gentoo.org/glsa/202007-05","https://source.android.com/security/bulletin/2020-05-01","https://usn.ubuntu.com/4396-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html","https://security.gentoo.org/glsa/202007-05","https://source.android.com/security/bulletin/2020-05-01","https://usn.ubuntu.com/4396-1/"],"published_time":"2020-05-14T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1945","summary":"Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.","cvss":6.3,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10947,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html","http://www.openwall.com/lists/oss-security/2020/09/30/6","http://www.openwall.com/lists/oss-security/2020/12/06/1","https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e%40%3Cdev.hive.apache.org%3E","https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35%40%3Ccommits.myfaces.apache.org%3E","https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6%40%3Ccommits.groovy.apache.org%3E","https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2%40%3Ctorque-dev.db.apache.org%3E","https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E","https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cdev.groovy.apache.org%3E","https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cusers.groovy.apache.org%3E","https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b%40%3Ccommits.myfaces.apache.org%3E","https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E","https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc%40%3Cuser.ant.apache.org%3E","https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735%40%3Ccommits.creadur.apache.org%3E","https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890%40%3Ccommits.creadur.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/","https://security.gentoo.org/glsa/202007-34","https://usn.ubuntu.com/4380-1/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html","http://www.openwall.com/lists/oss-security/2020/09/30/6","http://www.openwall.com/lists/oss-security/2020/12/06/1","https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e%40%3Cdev.hive.apache.org%3E","https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35%40%3Ccommits.myfaces.apache.org%3E","https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6%40%3Ccommits.groovy.apache.org%3E","https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2%40%3Ctorque-dev.db.apache.org%3E","https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf%40%3Cissues.hive.apache.org%3E","https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E","https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cdev.groovy.apache.org%3E","https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cusers.groovy.apache.org%3E","https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b%40%3Ccommits.myfaces.apache.org%3E","https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E","https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc%40%3Cuser.ant.apache.org%3E","https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c%40%3Cnotifications.groovy.apache.org%3E","https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735%40%3Ccommits.creadur.apache.org%3E","https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2%40%3Cdev.creadur.apache.org%3E","https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890%40%3Ccommits.creadur.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/","https://security.gentoo.org/glsa/202007-34","https://usn.ubuntu.com/4380-1/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-05-14T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12823","summary":"OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01863,"ranking_epss":0.83094,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html","https://bugs.gentoo.org/721570","https://gitlab.com/openconnect/openconnect/-/merge_requests/108","https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/","https://security.gentoo.org/glsa/202006-15","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html","https://bugs.gentoo.org/721570","https://gitlab.com/openconnect/openconnect/-/merge_requests/108","https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/","https://security.gentoo.org/glsa/202006-15"],"published_time":"2020-05-12T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11863","summary":"libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 1 of 2).","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00437,"ranking_epss":0.63116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/"],"published_time":"2020-05-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11864","summary":"libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 2 of 2).","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00437,"ranking_epss":0.63116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/"],"published_time":"2020-05-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11865","summary":"libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows out-of-bounds memory access.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0041,"ranking_epss":0.61381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/"],"published_time":"2020-05-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11866","summary":"libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows a use-after-free.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0041,"ranking_epss":0.61381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DFYDSKWFM2R5NKZOO2IN6X7SM3T2PWL/","https://sourceforge.net/p/libemf/code/commit_browser","https://sourceforge.net/p/libemf/mailman/libemf-devel/","https://sourceforge.net/p/libemf/news/2020/05/re-release-of-libemf-1012/"],"published_time":"2020-05-11T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12767","summary":"exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.36085,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/issues/31","https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4358-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","https://github.com/libexif/libexif/issues/31","https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html","https://security.gentoo.org/glsa/202007-05","https://usn.ubuntu.com/4358-1/"],"published_time":"2020-05-09T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12769","summary":"An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.19134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19b61392c5a852b4e8a0bf35aecb969983c5932d","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://lkml.org/lkml/2020/2/3/559","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4391-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19b61392c5a852b4e8a0bf35aecb969983c5932d","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://lkml.org/lkml/2020/2/3/559","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4391-1/"],"published_time":"2020-05-09T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12771","summary":"An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14593,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lkml.org/lkml/2020/4/26/87","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4462-1/","https://usn.ubuntu.com/4463-1/","https://usn.ubuntu.com/4465-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lkml.org/lkml/2020/4/26/87","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4462-1/","https://usn.ubuntu.com/4463-1/","https://usn.ubuntu.com/4465-1/","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2020-05-09T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10690","summary":"There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10690","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4419-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10690","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://usn.ubuntu.com/4419-1/"],"published_time":"2020-05-08T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12108","summary":"/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.07993,"ranking_epss":0.92099,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html","https://bugs.launchpad.net/mailman/+bug/1873722","https://code.launchpad.net/mailman","https://lists.debian.org/debian-lts-announce/2020/05/msg00007.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74EQIVFB34Q4UYAQLCUWG55YLKAUWCHD/","https://mail.python.org/pipermail/mailman-announce/","https://usn.ubuntu.com/4354-1/","https://www.debian.org/security/2021/dsa-4991","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html","https://bugs.launchpad.net/mailman/+bug/1873722","https://code.launchpad.net/mailman","https://lists.debian.org/debian-lts-announce/2020/05/msg00007.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74EQIVFB34Q4UYAQLCUWG55YLKAUWCHD/","https://mail.python.org/pipermail/mailman-announce/","https://usn.ubuntu.com/4354-1/","https://www.debian.org/security/2021/dsa-4991"],"published_time":"2020-05-06T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10704","summary":"A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08887,"ranking_epss":0.92574,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/","https://security.gentoo.org/glsa/202007-15","https://www.samba.org/samba/security/CVE-2020-10704.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704","https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/","https://security.gentoo.org/glsa/202007-15","https://www.samba.org/samba/security/CVE-2020-10704.html"],"published_time":"2020-05-06T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12672","summary":"GraphicsMagick through 1.3.35 has a heap-based buffer overflow in ReadMNGImage in coders/png.c.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02691,"ranking_epss":0.85887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00012.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19025","https://lists.debian.org/debian-lts-announce/2020/06/msg00004.html","https://security.gentoo.org/glsa/202209-19","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00012.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19025","https://lists.debian.org/debian-lts-announce/2020/06/msg00004.html","https://security.gentoo.org/glsa/202209-19"],"published_time":"2020-05-06T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12653","summary":"An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00195,"ranking_epss":0.41493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://www.openwall.com/lists/oss-security/2020/05/08/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d","https://github.com/torvalds/linux/commit/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://www.openwall.com/lists/oss-security/2020/05/08/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d","https://github.com/torvalds/linux/commit/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200608-0001/","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-05-05T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12656","summary":"gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.2907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://bugzilla.kernel.org/show_bug.cgi?id=206651","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://bugzilla.kernel.org/show_bug.cgi?id=206651","https://usn.ubuntu.com/4483-1/","https://usn.ubuntu.com/4485-1/"],"published_time":"2020-05-05T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10700","summary":"A use-after-free flaw was found in the way samba AD DC LDAP servers, handled 'Paged Results' control is combined with the 'ASQ' control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.","cvss":5.3,"cvss_version":3.0,"cvss_v2":2.6,"cvss_v3":5.3,"cvss_v4":null,"epss":0.02857,"ranking_epss":0.86265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/","https://security.gentoo.org/glsa/202007-15","https://www.samba.org/samba/security/CVE-2020-10700.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/","https://security.gentoo.org/glsa/202007-15","https://www.samba.org/samba/security/CVE-2020-10700.html"],"published_time":"2020-05-04T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12640","summary":"Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.22659,"ranking_epss":0.95875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube","https://github.com/roundcube/roundcubemail/commit/814eadb699e8576ce3a78f21e95bf69a7c7b3794","https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4","https://github.com/roundcube/roundcubemail/releases/tag/1.4.4","https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10","https://security.gentoo.org/glsa/202007-41","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube","https://github.com/roundcube/roundcubemail/commit/814eadb699e8576ce3a78f21e95bf69a7c7b3794","https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4","https://github.com/roundcube/roundcubemail/releases/tag/1.4.4","https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10","https://security.gentoo.org/glsa/202007-41"],"published_time":"2020-05-04T15:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12641","summary":"rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.93133,"ranking_epss":0.99798,"kev":true,"propose_action":"Roundcube Webmail contains an remote code execution vulnerability that allows attackers to execute code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube","https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3","https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4","https://github.com/roundcube/roundcubemail/releases/tag/1.4.4","https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10","https://security.gentoo.org/glsa/202007-41","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube","https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3","https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4","https://github.com/roundcube/roundcubemail/releases/tag/1.4.4","https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10","https://security.gentoo.org/glsa/202007-41","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-12641"],"published_time":"2020-05-04T15:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12625","summary":"An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0231,"ranking_epss":0.84788,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube","https://github.com/roundcube/roundcubemail/commit/87e4cd0cf2c550e77586860b94e5c75d2b7686d0","https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4","https://github.com/roundcube/roundcubemail/releases/tag/1.4.4","https://security.gentoo.org/glsa/202007-41","https://www.debian.org/security/2020/dsa-4674","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube","https://github.com/roundcube/roundcubemail/commit/87e4cd0cf2c550e77586860b94e5c75d2b7686d0","https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4","https://github.com/roundcube/roundcubemail/releases/tag/1.4.4","https://security.gentoo.org/glsa/202007-41","https://www.debian.org/security/2020/dsa-4674"],"published_time":"2020-05-04T02:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10683","summary":"dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0696,"ranking_epss":0.91464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html","https://bugzilla.redhat.com/show_bug.cgi?id=1694235","https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html","https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658","https://github.com/dom4j/dom4j/commits/version-2.0.3","https://github.com/dom4j/dom4j/issues/87","https://github.com/dom4j/dom4j/releases/tag/version-2.1.3","https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8%40%3Cdev.velocity.apache.org%3E","https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32%40%3Cdev.velocity.apache.org%3E","https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51%40%3Cnotifications.freemarker.apache.org%3E","https://security.netapp.com/advisory/ntap-20200518-0002/","https://usn.ubuntu.com/4575-1/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html","https://bugzilla.redhat.com/show_bug.cgi?id=1694235","https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html","https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658","https://github.com/dom4j/dom4j/commits/version-2.0.3","https://github.com/dom4j/dom4j/issues/87","https://github.com/dom4j/dom4j/releases/tag/version-2.1.3","https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8%40%3Cdev.velocity.apache.org%3E","https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32%40%3Cdev.velocity.apache.org%3E","https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51%40%3Cnotifications.freemarker.apache.org%3E","https://security.netapp.com/advisory/ntap-20200518-0002/","https://usn.ubuntu.com/4575-1/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-05-01T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11651","summary":"An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.94421,"ranking_epss":0.9998,"kev":true,"propose_action":"SaltStack Salt contains an authentication bypass vulnerability in the salt-master process ClearFuncs due to improperly validating method calls. The vulnerability allows a remote user to access some methods without authentication, which can be used to retrieve user tokens from the salt master and/or run commands on salt minions. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html","http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html","http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html","http://www.vmware.com/security/advisories/VMSA-2020-0009.html","https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html","https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst","https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG","https://usn.ubuntu.com/4459-1/","https://www.debian.org/security/2020/dsa-4676","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html","http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html","http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html","http://www.vmware.com/security/advisories/VMSA-2020-0009.html","https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html","https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst","https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG","https://usn.ubuntu.com/4459-1/","https://www.debian.org/security/2020/dsa-4676","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11651"],"published_time":"2020-04-30T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11652","summary":"An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.94265,"ranking_epss":0.99936,"kev":true,"propose_action":"SaltStack Salt contains a path traversal vulnerability in the salt-master process ClearFuncs which allows directory access to authenticated users. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html","http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html","http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html","http://support.blackberry.com/kb/articleDetail?articleNumber=000063758","http://www.vmware.com/security/advisories/VMSA-2020-0009.html","https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html","https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst","https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG","https://usn.ubuntu.com/4459-1/","https://www.debian.org/security/2020/dsa-4676","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html","http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html","http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html","http://support.blackberry.com/kb/articleDetail?articleNumber=000063758","http://www.vmware.com/security/advisories/VMSA-2020-0009.html","https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html","https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst","https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG","https://usn.ubuntu.com/4459-1/","https://www.debian.org/security/2020/dsa-4676","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11652"],"published_time":"2020-04-30T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11022","summary":"In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","cvss":6.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.9,"cvss_v4":null,"epss":0.03538,"ranking_epss":0.87689,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://security.netapp.com/advisory/ntap-20200511-0006","https://blog.jquery.com/2020/04/10/jquery-3-5-0-released","https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77","https://github.com/jquery/jquery/releases/tag/3.5.0","https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2","https://github.com/maximebf/php-debugbar/commit/847216e60544258c881f2733d699bbcfeefac0fc","https://github.com/maximebf/php-debugbar/issues/447","https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-11022.yml","https://jquery.com/upgrade-guide/3.5","https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E","https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E","https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W","https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html","https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html","https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html","https://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html","https://security.gentoo.org/glsa/202007-03","https://www.debian.org/security/2020/dsa-4693","https://www.drupal.org/sa-core-2020-002","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.tenable.com/security/tns-2020-10","https://www.tenable.com/security/tns-2020-11","https://www.tenable.com/security/tns-2021-02","https://www.tenable.com/security/tns-2021-10","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html","http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html","https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/","https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77","https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2","https://jquery.com/upgrade-guide/3.5/","https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E","https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133%40%3Ccommits.airflow.apache.org%3E","https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E","https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/","https://security.gentoo.org/glsa/202007-03","https://security.netapp.com/advisory/ntap-20200511-0006/","https://www.debian.org/security/2020/dsa-4693","https://www.drupal.org/sa-core-2020-002","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.tenable.com/security/tns-2020-10","https://www.tenable.com/security/tns-2020-11","https://www.tenable.com/security/tns-2021-02","https://www.tenable.com/security/tns-2021-10"],"published_time":"2020-04-29T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10663","summary":"The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07526,"ranking_epss":0.91827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html","http://seclists.org/fulldisclosure/2020/Dec/32","https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c%40%3Cissues.zookeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/","https://security.netapp.com/advisory/ntap-20210129-0003/","https://support.apple.com/kb/HT211931","https://www.debian.org/security/2020/dsa-4721","https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html","http://seclists.org/fulldisclosure/2020/Dec/32","https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c%40%3Cissues.zookeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/","https://security.netapp.com/advisory/ntap-20210129-0003/","https://support.apple.com/kb/HT211931","https://www.debian.org/security/2020/dsa-4721","https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/"],"published_time":"2020-04-28T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12243","summary":"In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.10757,"ranking_epss":0.9336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html","https://bugs.openldap.org/show_bug.cgi?id=9202","https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES","https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440","https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html","https://security.netapp.com/advisory/ntap-20200511-0003/","https://support.apple.com/kb/HT211289","https://usn.ubuntu.com/4352-1/","https://usn.ubuntu.com/4352-2/","https://www.debian.org/security/2020/dsa-4666","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html","https://bugs.openldap.org/show_bug.cgi?id=9202","https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES","https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440","https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html","https://security.netapp.com/advisory/ntap-20200511-0003/","https://support.apple.com/kb/HT211289","https://usn.ubuntu.com/4352-1/","https://usn.ubuntu.com/4352-2/","https://www.debian.org/security/2020/dsa-4666","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-04-28T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12268","summary":"jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00813,"ranking_epss":0.74309,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332","https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e","https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18","https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332","https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e","https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18","https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html"],"published_time":"2020-04-27T02:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12137","summary":"GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.05217,"ranking_epss":0.8996,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html","http://www.openwall.com/lists/oss-security/2020/04/24/3","https://lists.debian.org/debian-lts-announce/2020/05/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YCMGTTOXXCVM4O6CYZLTZDX6YLYORNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4COSBBEMJYLV7WSW5QTUJUOFJFK47KK/","https://usn.ubuntu.com/4348-1/","https://www.debian.org/security/2020/dsa-4664","https://www.openwall.com/lists/oss-security/2020/02/24/2","https://www.openwall.com/lists/oss-security/2020/02/24/3","http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html","http://www.openwall.com/lists/oss-security/2020/04/24/3","https://lists.debian.org/debian-lts-announce/2020/05/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YCMGTTOXXCVM4O6CYZLTZDX6YLYORNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4COSBBEMJYLV7WSW5QTUJUOFJFK47KK/","https://usn.ubuntu.com/4348-1/","https://www.debian.org/security/2020/dsa-4664","https://www.openwall.com/lists/oss-security/2020/02/24/2","https://www.openwall.com/lists/oss-security/2020/02/24/3"],"published_time":"2020-04-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12105","summary":"OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00171,"ranking_epss":0.38327,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html","https://gitlab.com/openconnect/openconnect/-/merge_requests/96","https://security.gentoo.org/glsa/202006-15","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html","https://gitlab.com/openconnect/openconnect/-/merge_requests/96","https://security.gentoo.org/glsa/202006-15"],"published_time":"2020-04-23T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11945","summary":"An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.28475,"ranking_epss":0.9654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://master.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch","http://www.openwall.com/lists/oss-security/2020/04/23/2","http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch","https://bugzilla.suse.com/show_bug.cgi?id=1170313","https://github.com/squid-cache/squid/commit/eeebf0f37a72a2de08348e85ae34b02c34e9a811","https://github.com/squid-cache/squid/pull/585","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FWQRYZJPHAZBLXJ56FPCHJN5X2FP3VA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4MWXEZAJSOGRJSS2JCJK4WBSND4IV46/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RV2VZWFJNO3B56IVN56HHKJASG5DYUIX/","https://security.gentoo.org/glsa/202005-05","https://security.netapp.com/advisory/ntap-20210304-0004/","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://master.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch","http://www.openwall.com/lists/oss-security/2020/04/23/2","http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch","https://bugzilla.suse.com/show_bug.cgi?id=1170313","https://github.com/squid-cache/squid/commit/eeebf0f37a72a2de08348e85ae34b02c34e9a811","https://github.com/squid-cache/squid/pull/585","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FWQRYZJPHAZBLXJ56FPCHJN5X2FP3VA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4MWXEZAJSOGRJSS2JCJK4WBSND4IV46/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RV2VZWFJNO3B56IVN56HHKJASG5DYUIX/","https://security.gentoo.org/glsa/202005-05","https://security.netapp.com/advisory/ntap-20210304-0004/","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2020-04-23T15:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1983","summary":"A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00202,"ranking_epss":0.42299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html","https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04","https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20","https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWFD4MWV3YWIHVHSA2F7FKOLJFL4PHOX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NKT2MTSINE4NUPG5L6BYH6N23NBNITOL/","https://usn.ubuntu.com/4372-1/","https://www.debian.org/security/2020/dsa-4665","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html","https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04","https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20","https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWFD4MWV3YWIHVHSA2F7FKOLJFL4PHOX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NKT2MTSINE4NUPG5L6BYH6N23NBNITOL/","https://usn.ubuntu.com/4372-1/","https://www.debian.org/security/2020/dsa-4665"],"published_time":"2020-04-22T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20787","summary":"Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00677,"ranking_epss":0.71543,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00045.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVYG7CCPS5F3OPOQMJKVNXTQ7BXSEX2V/","https://www.teeworlds.com/forum/viewtopic.php?pid=123860","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00045.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVYG7CCPS5F3OPOQMJKVNXTQ7BXSEX2V/","https://www.teeworlds.com/forum/viewtopic.php?pid=123860"],"published_time":"2020-04-22T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12066","summary":"CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05727,"ranking_epss":0.90453,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00045.html","https://github.com/teeworlds/teeworlds/commit/c68402fa7e279d42886d5951d1ea8ac2facc1ea5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVYG7CCPS5F3OPOQMJKVNXTQ7BXSEX2V/","https://usn.ubuntu.com/4553-1/","https://www.debian.org/security/2020/dsa-4763","https://www.teeworlds.com/forum/viewtopic.php?id=14785","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00045.html","https://github.com/teeworlds/teeworlds/commit/c68402fa7e279d42886d5951d1ea8ac2facc1ea5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVYG7CCPS5F3OPOQMJKVNXTQ7BXSEX2V/","https://usn.ubuntu.com/4553-1/","https://www.debian.org/security/2020/dsa-4763","https://www.teeworlds.com/forum/viewtopic.php?id=14785"],"published_time":"2020-04-22T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1967","summary":"Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.67307,"ranking_epss":0.98571,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html","http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html","http://seclists.org/fulldisclosure/2020/May/5","http://www.openwall.com/lists/oss-security/2020/04/22/2","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=eb563247aef3e83dda7679c43f9649270462e5b1","https://github.com/irsl/CVE-2020-1967","https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440","https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee%40%3Cdev.tomcat.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc","https://security.gentoo.org/glsa/202004-10","https://security.netapp.com/advisory/ntap-20200424-0003/","https://security.netapp.com/advisory/ntap-20200717-0004/","https://www.debian.org/security/2020/dsa-4661","https://www.openssl.org/news/secadv/20200421.txt","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.synology.com/security/advisory/Synology_SA_20_05","https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL","https://www.tenable.com/security/tns-2020-03","https://www.tenable.com/security/tns-2020-04","https://www.tenable.com/security/tns-2020-11","https://www.tenable.com/security/tns-2021-10","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html","http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html","http://seclists.org/fulldisclosure/2020/May/5","http://www.openwall.com/lists/oss-security/2020/04/22/2","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=eb563247aef3e83dda7679c43f9649270462e5b1","https://github.com/irsl/CVE-2020-1967","https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440","https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee%40%3Cdev.tomcat.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc","https://security.gentoo.org/glsa/202004-10","https://security.netapp.com/advisory/ntap-20200424-0003/","https://security.netapp.com/advisory/ntap-20200717-0004/","https://www.debian.org/security/2020/dsa-4661","https://www.openssl.org/news/secadv/20200421.txt","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.synology.com/security/advisory/Synology_SA_20_05","https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL","https://www.tenable.com/security/tns-2020-03","https://www.tenable.com/security/tns-2020-04","https://www.tenable.com/security/tns-2020-11","https://www.tenable.com/security/tns-2021-10"],"published_time":"2020-04-21T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11793","summary":"A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00816,"ranking_epss":0.74376,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3P4YISPE5QX4YD54GDRZIH2X5RCH3QGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3MQTRC6ITFTVS5R5Z24PMJS6FXJKGRD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTKY2MWP6PB6TE3ZKOOMKX7HZUCQNYF6/","https://security.gentoo.org/glsa/202006-08","https://usn.ubuntu.com/4331-1/","https://webkitgtk.org/security/WSA-2020-0004.html","https://wpewebkit.org/security/WSA-2020-0004.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3P4YISPE5QX4YD54GDRZIH2X5RCH3QGW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3MQTRC6ITFTVS5R5Z24PMJS6FXJKGRD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTKY2MWP6PB6TE3ZKOOMKX7HZUCQNYF6/","https://security.gentoo.org/glsa/202006-08","https://usn.ubuntu.com/4331-1/","https://webkitgtk.org/security/WSA-2020-0004.html","https://wpewebkit.org/security/WSA-2020-0004.html"],"published_time":"2020-04-17T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11868","summary":"ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.","cvss":5.9,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01301,"ranking_epss":0.79759,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html","http://support.ntp.org/bin/view/Main/NtpBug3592","https://bugzilla.redhat.com/show_bug.cgi?id=1716665","https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html","https://security.gentoo.org/glsa/202007-12","https://security.netapp.com/advisory/ntap-20200424-0002/","https://www.oracle.com//security-alerts/cpujul2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html","http://support.ntp.org/bin/view/Main/NtpBug3592","https://bugzilla.redhat.com/show_bug.cgi?id=1716665","https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html","https://security.gentoo.org/glsa/202007-12","https://security.netapp.com/advisory/ntap-20200424-0002/","https://www.oracle.com//security-alerts/cpujul2021.html"],"published_time":"2020-04-17T04:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12519","summary":"An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.07536,"ranking_epss":0.91834,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.openwall.com/lists/oss-security/2020/04/23/1","https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://security.gentoo.org/glsa/202005-05","https://security.netapp.com/advisory/ntap-20210205-0006/","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.openwall.com/lists/oss-security/2020/04/23/1","https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://security.gentoo.org/glsa/202005-05","https://security.netapp.com/advisory/ntap-20210205-0006/","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2020-04-15T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12521","summary":"An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00565,"ranking_epss":0.68487,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.openwall.com/lists/oss-security/2020/04/23/1","https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12521.txt","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://security.gentoo.org/glsa/202005-05","https://security.netapp.com/advisory/ntap-20210205-0006/","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.openwall.com/lists/oss-security/2020/04/23/1","https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12521.txt","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://security.gentoo.org/glsa/202005-05","https://security.netapp.com/advisory/ntap-20210205-0006/","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2020-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2951","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).","cvss":6.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35714,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2958","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00167,"ranking_epss":0.37873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2959","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via MLD to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).","cvss":8.6,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":8.6,"cvss_v4":null,"epss":0.01335,"ranking_epss":0.80007,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2929","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00206,"ranking_epss":0.42759,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-508/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-508/"],"published_time":"2020-04-15T14:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2908","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":8.2,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.37268,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-501/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-501/"],"published_time":"2020-04-15T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2909","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 2.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).","cvss":2.8,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":2.8,"cvss_v4":null,"epss":0.00224,"ranking_epss":0.45102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2910","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).","cvss":6.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00188,"ranking_epss":0.40632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2911","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.3765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-551/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-551/"],"published_time":"2020-04-15T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2913","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2914","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2894","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":6.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-581/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-581/"],"published_time":"2020-04-15T14:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2902","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).","cvss":8.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35788,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-497/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-497/"],"published_time":"2020-04-15T14:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2905","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":8.2,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00167,"ranking_epss":0.37873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2907","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.37268,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-509/","https://www.zerodayinitiative.com/advisories/ZDI-20-510/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-509/","https://www.zerodayinitiative.com/advisories/ZDI-20-510/"],"published_time":"2020-04-15T14:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2814","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.47 and prior, 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31722,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2816","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00708,"ranking_epss":0.72234,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2830","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00222,"ranking_epss":0.44903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2800","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.68847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2803","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).","cvss":8.3,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.3,"cvss_v4":null,"epss":0.03262,"ranking_epss":0.87164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2805","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).","cvss":8.3,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.3,"cvss_v4":null,"epss":0.01833,"ranking_epss":0.82955,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2812","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.31363,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://usn.ubuntu.com/4350-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://usn.ubuntu.com/4350-1/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2781","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00255,"ranking_epss":0.48941,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2767","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00328,"ranking_epss":0.55866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2773","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00771,"ranking_epss":0.73592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2778","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00435,"ranking_epss":0.62921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2752","summary":"Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).","cvss":5.3,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00229,"ranking_epss":0.45795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2754","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00295,"ranking_epss":0.52812,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2755","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2756","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.0026,"ranking_epss":0.49464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2757","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.0026,"ranking_epss":0.49464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10332","https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","https://security.gentoo.org/glsa/202006-22","https://security.gentoo.org/glsa/202209-15","https://security.netapp.com/advisory/ntap-20200416-0004/","https://usn.ubuntu.com/4337-1/","https://www.debian.org/security/2020/dsa-4662","https://www.debian.org/security/2020/dsa-4668","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2758","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":8.2,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.3765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-507/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-507/"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2760","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).","cvss":5.5,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00111,"ranking_epss":0.29532,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://usn.ubuntu.com/4350-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/","https://security.gentoo.org/glsa/202012-08","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200416-0003/","https://usn.ubuntu.com/4350-1/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-04-15T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2742","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).","cvss":8.2,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.3765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-499/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-499/"],"published_time":"2020-04-15T14:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2743","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":6.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.27932,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-500/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-500/"],"published_time":"2020-04-15T14:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2748","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).","cvss":3.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.2,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-506/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-506/"],"published_time":"2020-04-15T14:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2741","summary":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).","cvss":6.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.27932,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-498/","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html","https://security.gentoo.org/glsa/202101-09","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.zerodayinitiative.com/advisories/ZDI-20-498/"],"published_time":"2020-04-15T14:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11758","summary":"An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read in ImfOptimizedPixelReading.h.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00642,"ranking_epss":0.70648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11760","summary":"An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during RLE uncompression in rleUncompress in ImfRle.cpp.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00642,"ranking_epss":0.70648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11762","summary":"An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read and write in DwaCompressor::uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.68833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11763","summary":"An issue was discovered in OpenEXR before 2.4.1. There is an std::vector out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.68833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11764","summary":"An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00781,"ranking_epss":0.73758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11765","summary":"An issue was discovered in OpenEXR before 2.4.1. There is an off-by-one error in use of the ImfXdr.h read function by DwaCompressor::Classifier::Classifier, leading to an out-of-bounds read.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.68833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html","https://bugs.chromium.org/p/project-zero/issues/detail?id=1987","https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-241-february-11-2020","https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.1","https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4KFGDQG5PVYAU7TS5MZ7XCS6EMPVII3/","https://security.gentoo.org/glsa/202107-27","https://support.apple.com/kb/HT211288","https://support.apple.com/kb/HT211289","https://support.apple.com/kb/HT211290","https://support.apple.com/kb/HT211291","https://support.apple.com/kb/HT211293","https://support.apple.com/kb/HT211294","https://support.apple.com/kb/HT211295","https://usn.ubuntu.com/4339-1/","https://www.debian.org/security/2020/dsa-4755"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-5260","summary":"Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external \"credential helper\" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.","cvss":9.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":9.3,"cvss_v4":null,"epss":0.32539,"ranking_epss":0.96869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html","http://www.openwall.com/lists/oss-security/2020/04/15/5","http://www.openwall.com/lists/oss-security/2020/04/15/6","http://www.openwall.com/lists/oss-security/2020/04/20/1","https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b","https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q","https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TVS5UG6JD3MYIGSBKMIOS6AF7CR5IPI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/","https://lore.kernel.org/git/xmqqy2qy7xn8.fsf%40gitster.c.googlers.com/","https://security.gentoo.org/glsa/202004-13","https://support.apple.com/kb/HT211141","https://usn.ubuntu.com/4329-1/","https://www.debian.org/security/2020/dsa-4657","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html","http://www.openwall.com/lists/oss-security/2020/04/15/5","http://www.openwall.com/lists/oss-security/2020/04/15/6","http://www.openwall.com/lists/oss-security/2020/04/20/1","https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b","https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q","https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TVS5UG6JD3MYIGSBKMIOS6AF7CR5IPI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/","https://lore.kernel.org/git/xmqqy2qy7xn8.fsf%40gitster.c.googlers.com/","https://security.gentoo.org/glsa/202004-13","https://support.apple.com/kb/HT211141","https://usn.ubuntu.com/4329-1/","https://www.debian.org/security/2020/dsa-4657"],"published_time":"2020-04-14T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11739","summary":"An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.25027,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html","http://www.openwall.com/lists/oss-security/2020/04/14/2","http://xenbits.xen.org/xsa/advisory-314.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/","https://security.gentoo.org/glsa/202005-08","https://www.debian.org/security/2020/dsa-4723","https://xenbits.xen.org/xsa/advisory-314.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html","http://www.openwall.com/lists/oss-security/2020/04/14/2","http://xenbits.xen.org/xsa/advisory-314.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/","https://security.gentoo.org/glsa/202005-08","https://www.debian.org/security/2020/dsa-4723","https://xenbits.xen.org/xsa/advisory-314.html"],"published_time":"2020-04-14T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11740","summary":"An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0009,"ranking_epss":0.2551,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html","http://www.openwall.com/lists/oss-security/2020/04/14/1","http://xenbits.xen.org/xsa/advisory-313.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/","https://security.gentoo.org/glsa/202005-08","https://www.debian.org/security/2020/dsa-4723","https://xenbits.xen.org/xsa/advisory-313.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html","http://www.openwall.com/lists/oss-security/2020/04/14/1","http://xenbits.xen.org/xsa/advisory-313.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/","https://security.gentoo.org/glsa/202005-08","https://www.debian.org/security/2020/dsa-4723","https://xenbits.xen.org/xsa/advisory-313.html"],"published_time":"2020-04-14T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11741","summary":"An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which \"active\" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29826,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html","http://www.openwall.com/lists/oss-security/2020/04/14/1","http://xenbits.xen.org/xsa/advisory-313.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/","https://security.gentoo.org/glsa/202005-08","https://www.debian.org/security/2020/dsa-4723","https://xenbits.xen.org/xsa/advisory-313.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html","http://www.openwall.com/lists/oss-security/2020/04/14/1","http://xenbits.xen.org/xsa/advisory-313.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/","https://security.gentoo.org/glsa/202005-08","https://www.debian.org/security/2020/dsa-4723","https://xenbits.xen.org/xsa/advisory-313.html"],"published_time":"2020-04-14T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6455","summary":"Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01242,"ranking_epss":0.79279,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1059669","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1059669","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6456","summary":"Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00612,"ranking_epss":0.69865,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1040755","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1040755","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6436","summary":"Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01494,"ranking_epss":0.81112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1034519","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1034519","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6437","summary":"Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00924,"ranking_epss":0.76049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/639173","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/639173","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6438","summary":"Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00695,"ranking_epss":0.71948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/714617","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/714617","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6439","summary":"Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00878,"ranking_epss":0.75372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/868145","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/868145","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6440","summary":"Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00695,"ranking_epss":0.71948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/894477","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/894477","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6441","summary":"Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00527,"ranking_epss":0.67097,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/959571","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/959571","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6442","summary":"Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01095,"ranking_epss":0.78027,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1013906","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1013906","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6443","summary":"Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01339,"ranking_epss":0.8003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1040080","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1040080","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6444","summary":"Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":6.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.3,"cvss_v4":null,"epss":0.01394,"ranking_epss":0.80414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/922882","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/922882","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6445","summary":"Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00527,"ranking_epss":0.67097,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/933171","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/933171","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6446","summary":"Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00527,"ranking_epss":0.67097,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/933172","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/933172","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6447","summary":"Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01494,"ranking_epss":0.81112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/991217","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/991217","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6448","summary":"Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01494,"ranking_epss":0.81112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1037872","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1037872","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6450","summary":"Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00781,"ranking_epss":0.73758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html","https://crbug.com/1062247","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMXT4OKBMCJSNSX7TZDBJNY6ORKFZRFO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQTV7EFWQKF6VJBCVH4PUQJLGO7ISLTN/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html","https://crbug.com/1062247","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMXT4OKBMCJSNSX7TZDBJNY6ORKFZRFO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQTV7EFWQKF6VJBCVH4PUQJLGO7ISLTN/"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6451","summary":"Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00781,"ranking_epss":0.73758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html","https://crbug.com/1061018","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMXT4OKBMCJSNSX7TZDBJNY6ORKFZRFO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQTV7EFWQKF6VJBCVH4PUQJLGO7ISLTN/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html","https://crbug.com/1061018","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMXT4OKBMCJSNSX7TZDBJNY6ORKFZRFO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQTV7EFWQKF6VJBCVH4PUQJLGO7ISLTN/"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6452","summary":"Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01048,"ranking_epss":0.77559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html","https://crbug.com/1059764","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMXT4OKBMCJSNSX7TZDBJNY6ORKFZRFO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQTV7EFWQKF6VJBCVH4PUQJLGO7ISLTN/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html","https://crbug.com/1059764","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMXT4OKBMCJSNSX7TZDBJNY6ORKFZRFO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQTV7EFWQKF6VJBCVH4PUQJLGO7ISLTN/"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6454","summary":"Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00787,"ranking_epss":0.73879,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1019161","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1019161","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6423","summary":"Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01907,"ranking_epss":0.83313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1043446","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1043446","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6430","summary":"Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01907,"ranking_epss":0.83313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1031479","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1031479","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6431","summary":"Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00798,"ranking_epss":0.74062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/852645","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/852645","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6432","summary":"Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/965611","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/965611","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6433","summary":"Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1043965","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1043965","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6434","summary":"Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01494,"ranking_epss":0.81112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1048555","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1048555","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6435","summary":"Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1032158","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html","https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html","https://crbug.com/1032158","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/","https://www.debian.org/security/2020/dsa-4714"],"published_time":"2020-04-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11647","summary":"In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01672,"ranking_epss":0.82165,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-07.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-07.html"],"published_time":"2020-04-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11669","summary":"An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23631,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","https://access.redhat.com/errata/RHSA-2019:3517","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0","https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0","https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208660.html","https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208661.html","https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208663.html","https://security.netapp.com/advisory/ntap-20200430-0001/","https://usn.ubuntu.com/4363-1/","https://usn.ubuntu.com/4368-1/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","https://access.redhat.com/errata/RHSA-2019:3517","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0","https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0","https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208660.html","https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208661.html","https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208663.html","https://security.netapp.com/advisory/ntap-20200430-0001/","https://usn.ubuntu.com/4363-1/","https://usn.ubuntu.com/4368-1/"],"published_time":"2020-04-10T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8834","summary":"KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to panic. There were two commits that, according to the reporter, introduced the vulnerability: f024ee098476 (\"KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures\") 87a11bb6a7f7 (\"KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode\") The former landed in 4.8, the latter in 4.17. This was fixed without realizing the impact in 4.18 with the following three commits, though it's believed the first is the only strictly necessary commit: 6f597c6b63b6 (\"KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()\") 7b0e827c6970 (\"KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm\") 009c872a8bc4 (\"KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file\")","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0009,"ranking_epss":0.25523,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867717","https://usn.ubuntu.com/4318-1/","https://usn.ubuntu.com/usn/usn-4318-1","https://www.openwall.com/lists/oss-security/2020/04/06/2","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867717","https://usn.ubuntu.com/4318-1/","https://usn.ubuntu.com/usn/usn-4318-1","https://www.openwall.com/lists/oss-security/2020/04/06/2"],"published_time":"2020-04-09T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20637","summary":"An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00478,"ranking_epss":0.6501,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00031.html","http://varnish-cache.org/security/VSV00004.html#vsv00004","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00031.html","http://varnish-cache.org/security/VSV00004.html#vsv00004"],"published_time":"2020-04-08T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11653","summary":"An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0126,"ranking_epss":0.79435,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00031.html","https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html","https://varnish-cache.org/security/VSV00005.html#vsv00005","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00031.html","https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html","https://varnish-cache.org/security/VSV00005.html#vsv00005"],"published_time":"2020-04-08T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11501","summary":"GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.","cvss":7.4,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":7.4,"cvss_v4":null,"epss":0.11487,"ranking_epss":0.93637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html","https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2","https://gitlab.com/gnutls/gnutls/-/issues/960","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/","https://security.gentoo.org/glsa/202004-06","https://security.netapp.com/advisory/ntap-20200416-0002/","https://usn.ubuntu.com/4322-1/","https://www.debian.org/security/2020/dsa-4652","https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html","https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2","https://gitlab.com/gnutls/gnutls/-/issues/960","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/","https://security.gentoo.org/glsa/202004-06","https://security.netapp.com/advisory/ntap-20200416-0002/","https://usn.ubuntu.com/4322-1/","https://www.debian.org/security/2020/dsa-4652","https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31"],"published_time":"2020-04-03T13:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18904","summary":"A Uncontrolled Resource Consumption vulnerability in rmt of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Public Cloud 15-SP1, SUSE Linux Enterprise Module for Server Applications 15, SUSE Linux Enterprise Module for Server Applications 15-SP1, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1 allows remote attackers to cause DoS against rmt by requesting migrations. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise High Performance Computing 15-LTSS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Module for Public Cloud 15-SP1 rmt-server versions prior to 2.5.2-3.9.1. SUSE Linux Enterprise Module for Server Applications 15 rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Module for Server Applications 15-SP1 rmt-server versions prior to 2.5.2-3.9.1. SUSE Linux Enterprise Server 15-LTSS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Server for SAP 15 rmt-server versions prior to 2.5.2-3.26.1. openSUSE Leap 15.1 rmt-server versions prior to 2.5.2-lp151.2.9.1.","cvss":6.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00933,"ranking_epss":0.76181,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1160922","https://bugzilla.suse.com/show_bug.cgi?id=1160922"],"published_time":"2020-04-03T07:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11494","summary":"An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00081,"ranking_epss":0.23789,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=08fadc32ce6239dc75fd5e869590e29bc62bbc28","https://github.com/torvalds/linux/commit/b9258a2cece4ec1f020715fe3554bc2e360f6264","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200430-0004/","https://usn.ubuntu.com/4363-1/","https://usn.ubuntu.com/4364-1/","https://usn.ubuntu.com/4368-1/","https://usn.ubuntu.com/4369-1/","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=08fadc32ce6239dc75fd5e869590e29bc62bbc28","https://github.com/torvalds/linux/commit/b9258a2cece4ec1f020715fe3554bc2e360f6264","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200430-0004/","https://usn.ubuntu.com/4363-1/","https://usn.ubuntu.com/4364-1/","https://usn.ubuntu.com/4368-1/","https://usn.ubuntu.com/4369-1/","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-04-02T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-11100","summary":"In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.74791,"ranking_epss":0.98866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00002.html","http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html","http://www.haproxy.org","https://bugzilla.redhat.com/show_bug.cgi?id=1819111","https://bugzilla.suse.com/show_bug.cgi?id=1168023","https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=5dfc5d5cd0d2128d77253ead3acf03a421ab5b88","https://lists.debian.org/debian-security-announce/2020/msg00052.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/264C7UL3X7L7QE74ZJ557IOUFS3J4QQC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNW5RZLIX7LOXRLV7WMHX22CI43XSXKW/","https://security.gentoo.org/glsa/202012-22","https://usn.ubuntu.com/4321-1/","https://www.debian.org/security/2020/dsa-4649","https://www.haproxy.org/download/2.1/src/CHANGELOG","https://www.mail-archive.com/haproxy%40formilux.org/msg36876.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00002.html","http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html","http://www.haproxy.org","https://bugzilla.redhat.com/show_bug.cgi?id=1819111","https://bugzilla.suse.com/show_bug.cgi?id=1168023","https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=5dfc5d5cd0d2128d77253ead3acf03a421ab5b88","https://lists.debian.org/debian-security-announce/2020/msg00052.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/264C7UL3X7L7QE74ZJ557IOUFS3J4QQC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNW5RZLIX7LOXRLV7WMHX22CI43XSXKW/","https://security.gentoo.org/glsa/202012-22","https://usn.ubuntu.com/4321-1/","https://www.debian.org/security/2020/dsa-4649","https://www.haproxy.org/download/2.1/src/CHANGELOG","https://www.mail-archive.com/haproxy%40formilux.org/msg36876.html"],"published_time":"2020-04-02T15:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8016","summary":"A Race Condition Enabling Link Following vulnerability in the packaging of texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users to corrupt files or potentially escalate privileges. This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.","cvss":4.9,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html","https://bugzilla.suse.com/show_bug.cgi?id=1159740","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html","https://bugzilla.suse.com/show_bug.cgi?id=1159740"],"published_time":"2020-04-02T14:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8017","summary":"A Race Condition Enabling Link Following vulnerability in the cron job shipped with texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users in group mktex to delete arbitrary files on the system This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.","cvss":6.2,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06142,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html","https://bugzilla.suse.com/show_bug.cgi?id=1158910","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html","https://bugzilla.suse.com/show_bug.cgi?id=1158910"],"published_time":"2020-04-02T14:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1927","summary":"In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.","cvss":6.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":6.1,"cvss_v4":null,"epss":0.11302,"ranking_epss":0.93552,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html","http://www.openwall.com/lists/oss-security/2020/04/03/1","http://www.openwall.com/lists/oss-security/2020/04/04/1","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/","https://security.netapp.com/advisory/ntap-20200413-0002/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html","http://www.openwall.com/lists/oss-security/2020/04/03/1","http://www.openwall.com/lists/oss-security/2020/04/04/1","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/","https://security.netapp.com/advisory/ntap-20200413-0002/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html"],"published_time":"2020-04-02T00:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1934","summary":"In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.38657,"ranking_epss":0.97258,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/","https://security.netapp.com/advisory/ntap-20200413-0002/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/","https://security.netapp.com/advisory/ntap-20200413-0002/","https://usn.ubuntu.com/4458-1/","https://www.debian.org/security/2020/dsa-4757","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2020-04-01T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7066","summary":"In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.3,"cvss_v4":null,"epss":0.01533,"ranking_epss":0.81361,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html","https://bugs.php.net/bug.php?id=79329","https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html","https://security.netapp.com/advisory/ntap-20200403-0001/","https://usn.ubuntu.com/4330-2/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html","https://bugs.php.net/bug.php?id=79329","https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html","https://security.netapp.com/advisory/ntap-20200403-0001/","https://usn.ubuntu.com/4330-2/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-04-01T04:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7064","summary":"In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0233,"ranking_epss":0.84852,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html","https://bugs.php.net/bug.php?id=79282","https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html","https://security.netapp.com/advisory/ntap-20200403-0001/","https://usn.ubuntu.com/4330-1/","https://usn.ubuntu.com/4330-2/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html","https://bugs.php.net/bug.php?id=79282","https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html","https://security.netapp.com/advisory/ntap-20200403-0001/","https://usn.ubuntu.com/4330-1/","https://usn.ubuntu.com/4330-2/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-04-01T04:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14905","summary":"A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.","cvss":7.3,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://access.redhat.com/errata/RHSA-2020:0216","https://access.redhat.com/errata/RHSA-2020:0218","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://access.redhat.com/errata/RHSA-2020:0216","https://access.redhat.com/errata/RHSA-2020:0218","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/"],"published_time":"2020-03-31T17:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6095","summary":"An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0053,"ranking_epss":0.67269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html","https://gitlab.freedesktop.org/gstreamer/gst-rtsp-server/-/commit/44ccca3086dd81081d72ca0b21d0ecdde962fb1a","https://security.gentoo.org/glsa/202009-05","https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1018","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html","https://gitlab.freedesktop.org/gstreamer/gst-rtsp-server/-/commit/44ccca3086dd81081d72ca0b21d0ecdde962fb1a","https://security.gentoo.org/glsa/202009-05","https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1018"],"published_time":"2020-03-27T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1769","summary":"In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.","cvss":3.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00663,"ranking_epss":0.71222,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-06/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-06/"],"published_time":"2020-03-27T13:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1770","summary":"Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.","cvss":2.4,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":2.4,"cvss_v4":null,"epss":0.0036,"ranking_epss":0.58183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-07/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-07/"],"published_time":"2020-03-27T13:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1772","summary":"It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.","cvss":6.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00449,"ranking_epss":0.63648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-09/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-09/"],"published_time":"2020-03-27T13:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10942","summary":"In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.4,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","http://www.openwall.com/lists/oss-security/2020/04/15/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8","https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://lkml.org/lkml/2020/2/15/125","https://security.netapp.com/advisory/ntap-20200403-0003/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4364-1/","https://www.debian.org/security/2020/dsa-4667","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","http://www.openwall.com/lists/oss-security/2020/04/15/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8","https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://lkml.org/lkml/2020/2/15/125","https://security.netapp.com/advisory/ntap-20200403-0003/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4364-1/","https://www.debian.org/security/2020/dsa-4667","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-03-24T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10938","summary":"GraphicsMagick before 1.3.35 has an integer overflow and resultant heap-based buffer overflow in HuffmanDecodeImage in magick/compress.c.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02898,"ranking_epss":0.86353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00007.html","https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/","https://www.debian.org/security/2020/dsa-4675","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html","https://lists.debian.org/debian-lts-announce/2020/04/msg00007.html","https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/","https://www.debian.org/security/2020/dsa-4675"],"published_time":"2020-03-24T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1747","summary":"A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.","cvss":9.8,"cvss_version":3.0,"cvss_v2":10.0,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0307,"ranking_epss":0.86767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747","https://github.com/yaml/pyyaml/pull/386","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/","https://www.oracle.com/security-alerts/cpujul2022.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747","https://github.com/yaml/pyyaml/pull/386","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/","https://www.oracle.com/security-alerts/cpujul2022.html"],"published_time":"2020-03-24T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10593","summary":"Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01218,"ranking_epss":0.79073,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html","https://security.gentoo.org/glsa/202003-50","https://trac.torproject.org/projects/tor/ticket/33619","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html","https://security.gentoo.org/glsa/202003-50","https://trac.torproject.org/projects/tor/ticket/33619"],"published_time":"2020-03-23T13:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10592","summary":"Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02,"ranking_epss":0.83693,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html","https://security.gentoo.org/glsa/202003-50","https://trac.torproject.org/projects/tor/ticket/33120","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html","https://security.gentoo.org/glsa/202003-50","https://trac.torproject.org/projects/tor/ticket/33120"],"published_time":"2020-03-23T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10802","summary":"In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.","cvss":8.0,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":8.0,"cvss_v4":null,"epss":0.01622,"ranking_epss":0.81871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/","https://www.phpmyadmin.net/security/PMASA-2020-3/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/","https://www.phpmyadmin.net/security/PMASA-2020-3/"],"published_time":"2020-03-22T05:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10803","summary":"In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.","cvss":5.4,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":5.4,"cvss_v4":null,"epss":0.03554,"ranking_epss":0.87712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/","https://www.phpmyadmin.net/security/PMASA-2020-4/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/","https://www.phpmyadmin.net/security/PMASA-2020-4/"],"published_time":"2020-03-22T05:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10804","summary":"In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).","cvss":8.0,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":8.0,"cvss_v4":null,"epss":0.02444,"ranking_epss":0.85208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/","https://www.phpmyadmin.net/security/PMASA-2020-2/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/","https://www.phpmyadmin.net/security/PMASA-2020-2/"],"published_time":"2020-03-22T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17185","summary":"In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00657,"ranking_epss":0.71082,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html","https://freeradius.org/security/","https://github.com/FreeRADIUS/freeradius-server/releases/tag/release_3_0_20","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html","https://freeradius.org/security/","https://github.com/FreeRADIUS/freeradius-server/releases/tag/release_3_0_20"],"published_time":"2020-03-21T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18860","summary":"Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.04339,"ranking_epss":0.88943,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","https://github.com/squid-cache/squid/pull/504","https://github.com/squid-cache/squid/pull/505","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4732","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.openwall.com/lists/oss-security/2025/11/04/7","http://www.openwall.com/lists/oss-security/2025/11/05/1","http://www.openwall.com/lists/oss-security/2025/11/05/7","https://github.com/squid-cache/squid/pull/504","https://github.com/squid-cache/squid/pull/505","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://usn.ubuntu.com/4356-1/","https://www.debian.org/security/2020/dsa-4732"],"published_time":"2020-03-20T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-5267","summary":"In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.","cvss":4.0,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00887,"ranking_epss":0.75509,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html","http://www.openwall.com/lists/oss-security/2020/03/19/1","https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a","https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv","https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html","http://www.openwall.com/lists/oss-security/2020/03/19/1","https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a","https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv","https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/"],"published_time":"2020-03-19T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10648","summary":"Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31496,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html","http://www.openwall.com/lists/oss-security/2020/03/18/5","https://github.com/u-boot/u-boot/commits/master","https://labs.f-secure.com/advisories/das-u-boot-verified-boot-bypass/","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html","http://www.openwall.com/lists/oss-security/2020/03/18/5","https://github.com/u-boot/u-boot/commits/master","https://labs.f-secure.com/advisories/das-u-boot-verified-boot-bypass/"],"published_time":"2020-03-19T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12921","summary":"In GraphicsMagick before 1.3.32, the text filename component allows remote attackers to read arbitrary files via a crafted image because of TranslateTextEx for SVG.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.05729,"ranking_epss":0.90455,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html","http://www.graphicsmagick.org/","https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md","https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html","https://www.debian.org/security/2020/dsa-4675","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html","http://www.graphicsmagick.org/","https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md","https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html","https://www.debian.org/security/2020/dsa-4675"],"published_time":"2020-03-18T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0556","summary":"Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access","cvss":7.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.3703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00008.html","https://security.gentoo.org/glsa/202003-49","https://usn.ubuntu.com/4311-1/","https://www.debian.org/security/2020/dsa-4647","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00008.html","https://security.gentoo.org/glsa/202003-49","https://usn.ubuntu.com/4311-1/","https://www.debian.org/security/2020/dsa-4647","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html"],"published_time":"2020-03-12T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10531","summary":"An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0079,"ranking_epss":0.73921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html","https://access.redhat.com/errata/RHSA-2020:0738","https://bugs.chromium.org/p/chromium/issues/detail?id=1044570","https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html","https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08","https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca","https://github.com/unicode-org/icu/pull/971","https://lists.debian.org/debian-lts-announce/2020/03/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/","https://security.gentoo.org/glsa/202003-15","https://unicode-org.atlassian.net/browse/ICU-20958","https://usn.ubuntu.com/4305-1/","https://www.debian.org/security/2020/dsa-4646","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html","https://access.redhat.com/errata/RHSA-2020:0738","https://bugs.chromium.org/p/chromium/issues/detail?id=1044570","https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html","https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08","https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca","https://github.com/unicode-org/icu/pull/971","https://lists.debian.org/debian-lts-announce/2020/03/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/","https://security.gentoo.org/glsa/202003-15","https://unicode-org.atlassian.net/browse/ICU-20958","https://usn.ubuntu.com/4305-1/","https://www.debian.org/security/2020/dsa-4646","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2020-03-12T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7598","summary":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","cvss":5.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00253,"ranking_epss":0.4866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html","https://snyk.io/vuln/SNYK-JS-MINIMIST-559764","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html","https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"],"published_time":"2020-03-11T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20382","summary":"QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.","cvss":3.5,"cvss_version":3.0,"cvss_v2":2.7,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","http://www.openwall.com/lists/oss-security/2020/03/05/1","https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://usn.ubuntu.com/4372-1/","https://www.debian.org/security/2020/dsa-4665","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","http://www.openwall.com/lists/oss-security/2020/03/05/1","https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://usn.ubuntu.com/4372-1/","https://www.debian.org/security/2020/dsa-4665"],"published_time":"2020-03-05T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10029","summary":"The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html","https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/","https://security.gentoo.org/glsa/202006-04","https://security.netapp.com/advisory/ntap-20200327-0003/","https://sourceware.org/bugzilla/show_bug.cgi?id=25487","https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=9333498794cde1d5cca518badf79533a24114b6f","https://usn.ubuntu.com/4416-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html","https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/","https://security.gentoo.org/glsa/202006-04","https://security.netapp.com/advisory/ntap-20200327-0003/","https://sourceware.org/bugzilla/show_bug.cgi?id=25487","https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=9333498794cde1d5cca518badf79533a24114b6f","https://usn.ubuntu.com/4416-1/"],"published_time":"2020-03-04T15:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3695","summary":"A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.","cvss":8.4,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1152763","https://bugzilla.suse.com/show_bug.cgi?id=1152763"],"published_time":"2020-03-03T11:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3696","summary":"A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local user pcp to overwrite arbitrary files with arbitrary content. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.","cvss":8.4,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28221,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1153921","https://bugzilla.suse.com/show_bug.cgi?id=1153921"],"published_time":"2020-03-03T11:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-10018","summary":"WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02644,"ranking_epss":0.85752,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html","https://bugs.webkit.org/show_bug.cgi?id=204342#c21","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOR5LPL4UASVAR76EIHCL4O2KGDWGC6K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLERWAS2LL7SX2GHA2DDZ2PL3QC5OHIF/","https://security.gentoo.org/glsa/202006-08","https://usn.ubuntu.com/4310-1/","https://webkitgtk.org/security/WSA-2020-0003.html","https://wpewebkit.org/security/WSA-2020-0003.html","https://www.debian.org/security/2020/dsa-4641","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html","https://bugs.webkit.org/show_bug.cgi?id=204342#c21","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOR5LPL4UASVAR76EIHCL4O2KGDWGC6K/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLERWAS2LL7SX2GHA2DDZ2PL3QC5OHIF/","https://security.gentoo.org/glsa/202006-08","https://usn.ubuntu.com/4310-1/","https://webkitgtk.org/security/WSA-2020-0003.html","https://wpewebkit.org/security/WSA-2020-0003.html","https://www.debian.org/security/2020/dsa-4641"],"published_time":"2020-03-02T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8013","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.","cvss":2.2,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":2.2,"cvss_v4":null,"epss":0.00053,"ranking_epss":0.16424,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html","https://bugzilla.suse.com/show_bug.cgi?id=1163922","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html","https://bugzilla.suse.com/show_bug.cgi?id=1163922"],"published_time":"2020-03-02T17:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18902","summary":"A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-3.5.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-3.21.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.6.1. openSUSE Factory wicked versions prior to 0.6.62.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02819,"ranking_epss":0.86176,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1160903","https://bugzilla.suse.com/show_bug.cgi?id=1160903"],"published_time":"2020-03-02T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18903","summary":"A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-2.18.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-28.26.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.9.1. openSUSE Factory wicked versions prior to 0.6.62.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02819,"ranking_epss":0.86176,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1160904","https://bugzilla.suse.com/show_bug.cgi?id=1160904"],"published_time":"2020-03-02T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18897","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Server 12 salt-master version 2019.2.0-46.83.1 and prior versions. SUSE Linux Enterprise Server 15 salt-master version 2019.2.0-6.21.1 and prior versions. openSUSE Factory salt-master version 2019.2.2-3.1 and prior versions.","cvss":8.4,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html","https://bugzilla.suse.com/show_bug.cgi?id=1157465","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html","https://bugzilla.suse.com/show_bug.cgi?id=1157465"],"published_time":"2020-03-02T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18901","summary":"A UNIX Symbolic Link (Symlink) Following vulnerability in the mysql-systemd-helper of the mariadb packaging of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows local attackers to change the permissions of arbitrary files to 0640. This issue affects: SUSE Linux Enterprise Server 12 mariadb versions prior to 10.2.31-3.25.1. SUSE Linux Enterprise Server 15 mariadb versions prior to 10.2.31-3.26.1.","cvss":5.1,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.27923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html","https://bugzilla.suse.com/show_bug.cgi?id=1160895","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html","https://bugzilla.suse.com/show_bug.cgi?id=1160895"],"published_time":"2020-03-02T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3698","summary":"UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions.","cvss":5.7,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00176,"ranking_epss":0.39145,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html","https://bugzilla.suse.com/show_bug.cgi?id=1156309","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html","https://bugzilla.suse.com/show_bug.cgi?id=1156309"],"published_time":"2020-02-28T14:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9431","summary":"In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04397,"ranking_epss":0.89015,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16341","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086003c9d616906e08bbeeab9c17b3aa4c6ff850","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-03.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16341","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086003c9d616906e08bbeeab9c17b3aa4c6ff850","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-03.html"],"published_time":"2020-02-27T23:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9428","summary":"In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08184,"ranking_epss":0.92206,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9fe2de783dbcbe74144678d60a4e3923367044b2","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-05.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9fe2de783dbcbe74144678d60a4e3923367044b2","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-05.html"],"published_time":"2020-02-27T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9429","summary":"In Wireshark 3.2.0 to 3.2.1, the WireGuard dissector could crash. This was addressed in epan/dissectors/packet-wireguard.c by handling the situation where a certain data structure intentionally has a NULL value.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00586,"ranking_epss":0.6913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16394","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=73c5fff899f253c44a72657048aec7db6edee571","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2530f740d67d41908e84434bb5ec99480c2ac2e","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-06.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16394","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=73c5fff899f253c44a72657048aec7db6edee571","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2530f740d67d41908e84434bb5ec99480c2ac2e","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-06.html"],"published_time":"2020-02-27T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9430","summary":"In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03608,"ranking_epss":0.87795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16368","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16383","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6b98dc63701b1da1cc7681cb383dabb0b7007d73","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=93d6b03a67953b82880cdbdcf0d30e2a3246d790","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-04.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16368","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16383","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6b98dc63701b1da1cc7681cb383dabb0b7007d73","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=93d6b03a67953b82880cdbdcf0d30e2a3246d790","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://security.gentoo.org/glsa/202007-13","https://www.wireshark.org/security/wnpa-sec-2020-04.html"],"published_time":"2020-02-27T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7062","summary":"In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01155,"ranking_epss":0.78563,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79221","https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html","https://security.gentoo.org/glsa/202003-57","https://usn.ubuntu.com/4330-1/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79221","https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html","https://security.gentoo.org/glsa/202003-57","https://usn.ubuntu.com/4330-1/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-02-27T21:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7063","summary":"In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.","cvss":5.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.5362,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79082","https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html","https://security.gentoo.org/glsa/202003-57","https://usn.ubuntu.com/4330-1/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79082","https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html","https://security.gentoo.org/glsa/202003-57","https://usn.ubuntu.com/4330-1/","https://www.debian.org/security/2020/dsa-4717","https://www.debian.org/security/2020/dsa-4719","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-02-27T21:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-3867","summary":"A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00362,"ranking_epss":0.58356,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210947","https://support.apple.com/HT210948","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210947","https://support.apple.com/HT210948"],"published_time":"2020-02-27T21:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-3868","summary":"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00275,"ranking_epss":0.50988,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210920","https://support.apple.com/HT210947","https://support.apple.com/HT210948","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210920","https://support.apple.com/HT210947","https://support.apple.com/HT210948"],"published_time":"2020-02-27T21:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-3862","summary":"A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00216,"ranking_epss":0.44225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210947","https://support.apple.com/HT210948","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210947","https://support.apple.com/HT210948"],"published_time":"2020-02-27T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-3865","summary":"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00472,"ranking_epss":0.64672,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210947","https://support.apple.com/HT210948","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html","https://security.gentoo.org/glsa/202003-22","https://support.apple.com/HT210947","https://support.apple.com/HT210948"],"published_time":"2020-02-27T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7041","summary":"An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00843,"ranking_epss":0.74786,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html","https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91","https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4","https://github.com/adrienverge/openfortivpn/issues/536","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html","https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91","https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4","https://github.com/adrienverge/openfortivpn/issues/536","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/"],"published_time":"2020-02-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7042","summary":"An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00616,"ranking_epss":0.69961,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html","https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3","https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4","https://github.com/adrienverge/openfortivpn/issues/536","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html","https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3","https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4","https://github.com/adrienverge/openfortivpn/issues/536","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/"],"published_time":"2020-02-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7043","summary":"An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL before 1.0.2. tunnel.c mishandles certificate validation because hostname comparisons do not consider '\\0' characters, as demonstrated by a good.example.com\\x00evil.example.com attack.","cvss":9.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00468,"ranking_epss":0.64504,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html","https://github.com/adrienverge/openfortivpn/commit/6328a070ddaab16faaf008cb9a8a62439c30f2a8","https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4","https://github.com/adrienverge/openfortivpn/issues/536","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html","https://github.com/adrienverge/openfortivpn/commit/6328a070ddaab16faaf008cb9a8a62439c30f2a8","https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4","https://github.com/adrienverge/openfortivpn/issues/536","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/"],"published_time":"2020-02-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9383","summary":"An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26356,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530","https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200313-0003/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4346-1/","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html","https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530","https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200313-0003/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4346-1/","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-02-25T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1938","summary":"When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.94469,"ranking_epss":0.99997,"kev":true,"propose_action":"Apache Tomcat treats Apache JServ Protocol (AJP) connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html","http://support.blackberry.com/kb/articleDetail?articleNumber=000062739","https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E","https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E","https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/","https://security.gentoo.org/glsa/202003-43","https://security.netapp.com/advisory/ntap-20200226-0002/","https://www.debian.org/security/2020/dsa-4673","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html","http://support.blackberry.com/kb/articleDetail?articleNumber=000062739","https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E","https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E","https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E","https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E","https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/","https://security.gentoo.org/glsa/202003-43","https://security.netapp.com/advisory/ntap-20200226-0002/","https://www.debian.org/security/2020/dsa-4673","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1938"],"published_time":"2020-02-24T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17569","summary":"The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.06163,"ranking_epss":0.9085,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html","https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html","https://security.netapp.com/advisory/ntap-20200327-0005/","https://www.debian.org/security/2020/dsa-4673","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html","https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html","https://security.netapp.com/advisory/ntap-20200327-0005/","https://www.debian.org/security/2020/dsa-4673","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-02-24T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1935","summary":"In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.01366,"ranking_epss":0.80224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html","https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://security.netapp.com/advisory/ntap-20200327-0005/","https://usn.ubuntu.com/4448-1/","https://www.debian.org/security/2020/dsa-4673","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html","https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E","https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E","https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://security.netapp.com/advisory/ntap-20200327-0005/","https://usn.ubuntu.com/4448-1/","https://www.debian.org/security/2020/dsa-4673","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2020-02-24T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8130","summary":"There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.","cvss":6.4,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00142,"ranking_epss":0.34471,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html","https://hackerone.com/reports/651518","https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/","https://usn.ubuntu.com/4295-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html","https://hackerone.com/reports/651518","https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/","https://usn.ubuntu.com/4295-1/"],"published_time":"2020-02-24T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9272","summary":"ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00518,"ranking_epss":0.6681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html","https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf","https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","https://github.com/proftpd/proftpd/issues/902","https://security.gentoo.org/glsa/202003-35","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html","https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf","https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","https://github.com/proftpd/proftpd/issues/902","https://security.gentoo.org/glsa/202003-35"],"published_time":"2020-02-20T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-9273","summary":"In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.68943,"ranking_epss":0.98638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html","http://www.openwall.com/lists/oss-security/2021/08/25/1","http://www.openwall.com/lists/oss-security/2021/09/06/2","https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf","https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","https://github.com/proftpd/proftpd/issues/903","https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/","https://security.gentoo.org/glsa/202003-35","https://www.debian.org/security/2020/dsa-4635","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html","http://www.openwall.com/lists/oss-security/2021/08/25/1","http://www.openwall.com/lists/oss-security/2021/09/06/2","https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf","https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","https://github.com/proftpd/proftpd/issues/903","https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/","https://security.gentoo.org/glsa/202003-35","https://www.debian.org/security/2020/dsa-4635"],"published_time":"2020-02-20T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20479","summary":"A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning.","cvss":6.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00474,"ranking_epss":0.64794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00036.html","https://github.com/zmartzone/mod_auth_openidc/commit/02431c0adfa30f478cf2eb20ed6ea51fdf446be7","https://github.com/zmartzone/mod_auth_openidc/pull/453","https://lists.debian.org/debian-lts-announce/2020/02/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00028.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27XJYAEONKJDESNE7WVZF5D2Z2OBY5JK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGXONXPWTX7DV62TIUIUVOZF4KQ6SIJE/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00036.html","https://github.com/zmartzone/mod_auth_openidc/commit/02431c0adfa30f478cf2eb20ed6ea51fdf446be7","https://github.com/zmartzone/mod_auth_openidc/pull/453","https://lists.debian.org/debian-lts-announce/2020/02/msg00035.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00028.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27XJYAEONKJDESNE7WVZF5D2Z2OBY5JK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGXONXPWTX7DV62TIUIUVOZF4KQ6SIJE/"],"published_time":"2020-02-20T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8992","summary":"ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16779,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://patchwork.ozlabs.org/patch/1236118/","https://security.netapp.com/advisory/ntap-20200313-0003/","https://usn.ubuntu.com/4318-1/","https://usn.ubuntu.com/4324-1/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4419-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://patchwork.ozlabs.org/patch/1236118/","https://security.netapp.com/advisory/ntap-20200313-0003/","https://usn.ubuntu.com/4318-1/","https://usn.ubuntu.com/4324-1/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4419-1/"],"published_time":"2020-02-14T05:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0561","summary":"Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00169,"ranking_epss":0.38144,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00336.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00336.html"],"published_time":"2020-02-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8955","summary":"irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.14209,"ranking_epss":0.94406,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html","https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da","https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html","https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/","https://security.gentoo.org/glsa/202003-51","https://weechat.org/doc/security/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html","https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da","https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html","https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ASRTCQFFDAAK347URWNDH6NSED2BGNY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER23GT23US5JXDLUZAMGMWXKZ74MI4S2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/","https://security.gentoo.org/glsa/202003-51","https://weechat.org/doc/security/"],"published_time":"2020-02-12T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19921","summary":"runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html","https://access.redhat.com/errata/RHSA-2020:0688","https://access.redhat.com/errata/RHSA-2020:0695","https://github.com/opencontainers/runc/issues/2197","https://github.com/opencontainers/runc/pull/2190","https://github.com/opencontainers/runc/releases","https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/","https://security-tracker.debian.org/tracker/CVE-2019-19921","https://security.gentoo.org/glsa/202003-21","https://usn.ubuntu.com/4297-1/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html","https://access.redhat.com/errata/RHSA-2020:0688","https://access.redhat.com/errata/RHSA-2020:0695","https://github.com/opencontainers/runc/issues/2197","https://github.com/opencontainers/runc/pull/2190","https://github.com/opencontainers/runc/releases","https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/","https://security-tracker.debian.org/tracker/CVE-2019-19921","https://security.gentoo.org/glsa/202003-21","https://usn.ubuntu.com/4297-1/"],"published_time":"2020-02-12T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1711","summary":"An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.","cvss":7.7,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00559,"ranking_epss":0.68287,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","https://access.redhat.com/errata/RHSA-2020:0669","https://access.redhat.com/errata/RHSA-2020:0730","https://access.redhat.com/errata/RHSA-2020:0731","https://access.redhat.com/errata/RHSA-2020:0773","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711","https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html","https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html","https://lists.gnu.org/archive/html/qemu-devel/2020-01/msg05535.html","https://security.gentoo.org/glsa/202005-02","https://usn.ubuntu.com/4283-1/","https://www.openwall.com/lists/oss-security/2020/01/23/3","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","https://access.redhat.com/errata/RHSA-2020:0669","https://access.redhat.com/errata/RHSA-2020:0730","https://access.redhat.com/errata/RHSA-2020:0731","https://access.redhat.com/errata/RHSA-2020:0773","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711","https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html","https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html","https://lists.gnu.org/archive/html/qemu-devel/2020-01/msg05535.html","https://security.gentoo.org/glsa/202005-02","https://usn.ubuntu.com/4283-1/","https://www.openwall.com/lists/oss-security/2020/01/23/3"],"published_time":"2020-02-11T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14553","summary":"gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00979,"ranking_epss":0.768,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html","https://bugzilla.redhat.com/show_bug.cgi?id=1599032","https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f","https://github.com/libgd/libgd/pull/580","https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/","https://usn.ubuntu.com/4316-1/","https://usn.ubuntu.com/4316-2/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html","https://bugzilla.redhat.com/show_bug.cgi?id=1599032","https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f","https://github.com/libgd/libgd/pull/580","https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/","https://usn.ubuntu.com/4316-1/","https://usn.ubuntu.com/4316-2/"],"published_time":"2020-02-11T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7059","summary":"When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02373,"ranking_epss":0.84988,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79099","https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.gentoo.org/glsa/202003-57","https://security.netapp.com/advisory/ntap-20200221-0002/","https://usn.ubuntu.com/4279-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79099","https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.gentoo.org/glsa/202003-57","https://security.netapp.com/advisory/ntap-20200221-0002/","https://usn.ubuntu.com/4279-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-02-10T08:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7060","summary":"When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.06404,"ranking_epss":0.91058,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79037","https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.gentoo.org/glsa/202003-57","https://security.netapp.com/advisory/ntap-20200221-0002/","https://usn.ubuntu.com/4279-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html","https://bugs.php.net/bug.php?id=79037","https://lists.debian.org/debian-lts-announce/2020/02/msg00030.html","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.gentoo.org/glsa/202003-57","https://security.netapp.com/advisory/ntap-20200221-0002/","https://usn.ubuntu.com/4279-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.tenable.com/security/tns-2021-14"],"published_time":"2020-02-10T08:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1700","summary":"A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00326,"ranking_epss":0.55664,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700","https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html","https://usn.ubuntu.com/4304-1/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700","https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html","https://usn.ubuntu.com/4304-1/"],"published_time":"2020-02-07T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15604","summary":"Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03533,"ranking_epss":0.87681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0598","https://access.redhat.com/errata/RHSA-2020:0602","https://hackerone.com/reports/746733","https://nodejs.org/en/blog/release/v10.19.0/","https://nodejs.org/en/blog/release/v12.15.0/","https://nodejs.org/en/blog/release/v13.8.0/","https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/","https://security.gentoo.org/glsa/202003-48","https://security.netapp.com/advisory/ntap-20200221-0004/","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0598","https://access.redhat.com/errata/RHSA-2020:0602","https://hackerone.com/reports/746733","https://nodejs.org/en/blog/release/v10.19.0/","https://nodejs.org/en/blog/release/v12.15.0/","https://nodejs.org/en/blog/release/v13.8.0/","https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/","https://security.gentoo.org/glsa/202003-48","https://security.netapp.com/advisory/ntap-20200221-0004/","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-02-07T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15605","summary":"HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.32252,"ranking_epss":0.96844,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0598","https://access.redhat.com/errata/RHSA-2020:0602","https://access.redhat.com/errata/RHSA-2020:0703","https://access.redhat.com/errata/RHSA-2020:0707","https://access.redhat.com/errata/RHSA-2020:0708","https://hackerone.com/reports/735748","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/","https://nodejs.org/en/blog/release/v10.19.0/","https://nodejs.org/en/blog/release/v12.15.0/","https://nodejs.org/en/blog/release/v13.8.0/","https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/","https://security.gentoo.org/glsa/202003-48","https://security.netapp.com/advisory/ntap-20200221-0004/","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0598","https://access.redhat.com/errata/RHSA-2020:0602","https://access.redhat.com/errata/RHSA-2020:0703","https://access.redhat.com/errata/RHSA-2020:0707","https://access.redhat.com/errata/RHSA-2020:0708","https://hackerone.com/reports/735748","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/","https://nodejs.org/en/blog/release/v10.19.0/","https://nodejs.org/en/blog/release/v12.15.0/","https://nodejs.org/en/blog/release/v13.8.0/","https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/","https://security.gentoo.org/glsa/202003-48","https://security.netapp.com/advisory/ntap-20200221-0004/","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-02-07T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15606","summary":"Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01338,"ranking_epss":0.80026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0598","https://access.redhat.com/errata/RHSA-2020:0602","https://hackerone.com/reports/730779","https://nodejs.org/en/blog/release/v10.19.0/","https://nodejs.org/en/blog/release/v12.15.0/","https://nodejs.org/en/blog/release/v13.8.0/","https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/","https://security.gentoo.org/glsa/202003-48","https://security.netapp.com/advisory/ntap-20200221-0004/","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0598","https://access.redhat.com/errata/RHSA-2020:0602","https://hackerone.com/reports/730779","https://nodejs.org/en/blog/release/v10.19.0/","https://nodejs.org/en/blog/release/v12.15.0/","https://nodejs.org/en/blog/release/v13.8.0/","https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/","https://security.gentoo.org/glsa/202003-48","https://security.netapp.com/advisory/ntap-20200221-0004/","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2020-02-07T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8608","summary":"In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.","cvss":5.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":5.6,"cvss_v4":null,"epss":0.01501,"ranking_epss":0.81183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0","https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843","https://lists.debian.org/debian-lts-announce/2020/03/msg00015.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.debian.org/debian-lts-announce/2021/02/msg00012.html","https://security.gentoo.org/glsa/202003-66","https://security.netapp.com/advisory/ntap-20201001-0002/","https://usn.ubuntu.com/4283-1/","https://www.debian.org/security/2020/dsa-4733","https://www.openwall.com/lists/oss-security/2020/02/06/2","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0","https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843","https://lists.debian.org/debian-lts-announce/2020/03/msg00015.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.debian.org/debian-lts-announce/2021/02/msg00012.html","https://security.gentoo.org/glsa/202003-66","https://security.netapp.com/advisory/ntap-20201001-0002/","https://usn.ubuntu.com/4283-1/","https://www.debian.org/security/2020/dsa-4733","https://www.openwall.com/lists/oss-security/2020/02/06/2"],"published_time":"2020-02-06T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8647","summary":"There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.","cvss":6.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22858,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html","https://bugzilla.kernel.org/show_bug.cgi?id=206359","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html","https://bugzilla.kernel.org/show_bug.cgi?id=206359","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-02-06T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8648","summary":"There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://bugzilla.kernel.org/show_bug.cgi?id=206361","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200924-0004/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4346-1/","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://bugzilla.kernel.org/show_bug.cgi?id=206361","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200924-0004/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4346-1/","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-02-06T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8649","summary":"There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.","cvss":5.9,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.25023,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html","https://bugzilla.kernel.org/show_bug.cgi?id=206357","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html","https://bugzilla.kernel.org/show_bug.cgi?id=206357","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2020-02-06T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7216","summary":"An ni_dhcp4_parse_response memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets without a message type option.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00341,"ranking_epss":0.56881,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html","https://bugzilla.suse.com/show_bug.cgi?id=1160905","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html","https://bugzilla.suse.com/show_bug.cgi?id=1160905"],"published_time":"2020-02-05T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-5208","summary":"It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.","cvss":7.7,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.7,"cvss_v4":null,"epss":0.02115,"ranking_epss":0.84146,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00031.html","https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2","https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp","https://lists.debian.org/debian-lts-announce/2020/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2021/06/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K2BPW66KDP4H36AGZXLED57A3O2Y6EQW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYYEKUAUTCWICM77HOEGZDVVEUJLP4BP/","https://security.gentoo.org/glsa/202101-03","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00031.html","https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2","https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp","https://lists.debian.org/debian-lts-announce/2020/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2021/06/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K2BPW66KDP4H36AGZXLED57A3O2Y6EQW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYYEKUAUTCWICM77HOEGZDVVEUJLP4BP/","https://security.gentoo.org/glsa/202101-03"],"published_time":"2020-02-05T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8631","summary":"cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html","https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795","https://github.com/canonical/cloud-init/pull/204","https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html","https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795","https://github.com/canonical/cloud-init/pull/204","https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html"],"published_time":"2020-02-05T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8632","summary":"In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26734,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html","https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795","https://github.com/canonical/cloud-init/pull/189","https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html","https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795","https://github.com/canonical/cloud-init/pull/189","https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html"],"published_time":"2020-02-05T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12528","summary":"An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23632,"ranking_epss":0.96006,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.squid-cache.org/Advisories/SQUID-2020_2.txt","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/","https://security.gentoo.org/glsa/202003-34","https://usn.ubuntu.com/4289-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.squid-cache.org/Advisories/SQUID-2020_2.txt","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/","https://security.gentoo.org/glsa/202003-34","https://usn.ubuntu.com/4289-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2020-02-04T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8449","summary":"An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0396,"ranking_epss":0.88377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://www.squid-cache.org/Advisories/SQUID-2020_1.txt","http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch","http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/","https://security.gentoo.org/glsa/202003-34","https://security.netapp.com/advisory/ntap-20210304-0002/","https://usn.ubuntu.com/4289-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://www.squid-cache.org/Advisories/SQUID-2020_1.txt","http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch","http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/","https://security.gentoo.org/glsa/202003-34","https://security.netapp.com/advisory/ntap-20210304-0002/","https://usn.ubuntu.com/4289-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2020-02-04T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8450","summary":"An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.","cvss":7.3,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.3,"cvss_v4":null,"epss":0.46287,"ranking_epss":0.97657,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://www.squid-cache.org/Advisories/SQUID-2020_1.txt","http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch","http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/","https://security.gentoo.org/glsa/202003-34","https://security.netapp.com/advisory/ntap-20210304-0002/","https://usn.ubuntu.com/4289-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://www.squid-cache.org/Advisories/SQUID-2020_1.txt","http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch","http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch","http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/","https://security.gentoo.org/glsa/202003-34","https://security.netapp.com/advisory/ntap-20210304-0002/","https://usn.ubuntu.com/4289-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2020-02-04T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8517","summary":"An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00828,"ranking_epss":0.74549,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.squid-cache.org/Advisories/SQUID-2020_3.txt","http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch","https://security.gentoo.org/glsa/202003-34","https://security.netapp.com/advisory/ntap-20210304-0002/","https://usn.ubuntu.com/4289-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html","http://www.squid-cache.org/Advisories/SQUID-2020_3.txt","http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch","https://security.gentoo.org/glsa/202003-34","https://security.netapp.com/advisory/ntap-20210304-0002/","https://usn.ubuntu.com/4289-1/"],"published_time":"2020-02-04T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20446","summary":"In xml.rs in GNOME librsvg before 2.46.2, a crafted SVG file with nested patterns can cause denial of service when passed to the library for processing. The attacker constructs pattern elements so that the number of final rendered objects grows exponentially.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0133,"ranking_epss":0.79972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html","https://gitlab.gnome.org/GNOME/librsvg/issues/515","https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/","https://security.netapp.com/advisory/ntap-20221111-0004/","https://usn.ubuntu.com/4436-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html","https://gitlab.gnome.org/GNOME/librsvg/issues/515","https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/","https://security.netapp.com/advisory/ntap-20221111-0004/","https://usn.ubuntu.com/4436-1/"],"published_time":"2020-02-02T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8492","summary":"Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.","cvss":6.5,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03512,"ranking_epss":0.87643,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html","https://bugs.python.org/issue39503","https://github.com/python/cpython/pull/18284","https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E","https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/","https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html","https://security.gentoo.org/glsa/202005-09","https://security.netapp.com/advisory/ntap-20200221-0001/","https://usn.ubuntu.com/4333-1/","https://usn.ubuntu.com/4333-2/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html","https://bugs.python.org/issue39503","https://github.com/python/cpython/pull/18284","https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E","https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/","https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html","https://security.gentoo.org/glsa/202005-09","https://security.netapp.com/advisory/ntap-20200221-0001/","https://usn.ubuntu.com/4333-1/","https://usn.ubuntu.com/4333-2/"],"published_time":"2020-01-30T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-8432","summary":"In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.","cvss":9.8,"cvss_version":3.0,"cvss_v2":10.0,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01959,"ranking_epss":0.83531,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html","https://www.mail-archive.com/u-boot%40lists.denx.de/msg354060.html","https://www.mail-archive.com/u-boot%40lists.denx.de/msg354114.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html","https://www.mail-archive.com/u-boot%40lists.denx.de/msg354060.html","https://www.mail-archive.com/u-boot%40lists.denx.de/msg354114.html"],"published_time":"2020-01-29T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-0549","summary":"Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/","https://security.netapp.com/advisory/ntap-20200210-0004/","https://usn.ubuntu.com/4385-1/","https://www.debian.org/security/2020/dsa-4701","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10318","https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/","https://security.netapp.com/advisory/ntap-20200210-0004/","https://usn.ubuntu.com/4385-1/","https://www.debian.org/security/2020/dsa-4701","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html"],"published_time":"2020-01-28T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-20105","summary":"A Inclusion of Sensitive Information in Log Files vulnerability in yast2-rmt of SUSE Linux Enterprise Server 15; openSUSE Leap allows local attackers to learn the password if they can access the log file. This issue affects: SUSE Linux Enterprise Server 15 yast2-rmt versions prior to 1.2.2. openSUSE Leap yast2-rmt versions prior to 1.2.2.","cvss":4.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34661,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00015.html","https://bugzilla.suse.com/show_bug.cgi?id=1119835","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00015.html","https://bugzilla.suse.com/show_bug.cgi?id=1119835"],"published_time":"2020-01-27T09:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-1348","summary":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths.","cvss":3.3,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":3.3,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.1524,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","https://access.redhat.com/errata/RHSA-2020:0228","https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://security.gentoo.org/glsa/202003-30","https://security.gentoo.org/glsa/202003-42","https://support.apple.com/kb/HT210729","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","https://access.redhat.com/errata/RHSA-2020:0228","https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://security.gentoo.org/glsa/202003-30","https://security.gentoo.org/glsa/202003-42","https://support.apple.com/kb/HT210729"],"published_time":"2020-01-24T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-1353","summary":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as \"WSL\") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00187,"ranking_epss":0.40543,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://security.gentoo.org/glsa/202003-30","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://security.gentoo.org/glsa/202003-30"],"published_time":"2020-01-24T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-1351","summary":"A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.22642,"ranking_epss":0.95872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://security.gentoo.org/glsa/202003-30","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://security.gentoo.org/glsa/202003-30"],"published_time":"2020-01-24T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3699","summary":"UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of privoxy on openSUSE Leap 15.1, Factory allows local attackers to escalate from user privoxy to root. This issue affects: openSUSE Leap 15.1 privoxy version 3.0.28-lp151.1.1 and prior versions. openSUSE Factory privoxy version 3.0.28-2.1 and prior versions.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.0012,"ranking_epss":0.30973,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1157449","https://bugzilla.suse.com/show_bug.cgi?id=1157449"],"published_time":"2020-01-24T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3697","summary":"UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of gnump3d in openSUSE Leap 15.1 allows local attackers to escalate from user gnump3d to root. This issue affects: openSUSE Leap 15.1 gnump3d version 3.0-lp151.2.1 and prior versions.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32342,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1154229","https://bugzilla.suse.com/show_bug.cgi?id=1154229"],"published_time":"2020-01-24T12:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3694","summary":"A Symbolic Link (Symlink) Following vulnerability in the packaging of munin in openSUSE Factory, Leap 15.1 allows local attackers to escalate from user munin to root. This issue affects: openSUSE Factory munin version 2.0.49-4.2 and prior versions. openSUSE Leap 15.1 munin version 2.0.40-lp151.1.1 and prior versions.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.0012,"ranking_epss":0.30973,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.suse.com/show_bug.cgi?id=1155078","https://bugzilla.suse.com/show_bug.cgi?id=1155078"],"published_time":"2020-01-24T11:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3693","summary":"A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00168,"ranking_epss":0.38062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00059.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00000.html","https://bugzilla.suse.com/show_bug.cgi?id=1154328","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00059.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00000.html","https://bugzilla.suse.com/show_bug.cgi?id=1154328"],"published_time":"2020-01-24T10:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3692","summary":"The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00168,"ranking_epss":0.38062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00028.html","https://bugzilla.suse.com/show_bug.cgi?id=1154302","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00027.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00028.html","https://bugzilla.suse.com/show_bug.cgi?id=1154302"],"published_time":"2020-01-24T09:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18899","summary":"The apt-cacher-ng package of openSUSE Leap 15.1 runs operations in user owned directory /run/apt-cacher-ng with root privileges. This can allow local attackers to influence the outcome of these operations. This issue affects: openSUSE Leap 15.1 apt-cacher-ng versions prior to 3.1-lp151.3.3.1.","cvss":6.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.2,"cvss_v4":null,"epss":0.0012,"ranking_epss":0.30925,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html","https://bugzilla.suse.com/show_bug.cgi?id=1157703","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html","https://bugzilla.suse.com/show_bug.cgi?id=1157703"],"published_time":"2020-01-23T15:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18898","summary":"UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1.","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00066.html","https://bugzilla.suse.com/show_bug.cgi?id=1157651","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00066.html","https://bugzilla.suse.com/show_bug.cgi?id=1157651"],"published_time":"2020-01-23T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20388","summary":"xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00614,"ranking_epss":0.69913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html","https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68","https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/","https://security.gentoo.org/glsa/202010-04","https://security.netapp.com/advisory/ntap-20200702-0005/","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html","https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68","https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/","https://security.gentoo.org/glsa/202010-04","https://security.netapp.com/advisory/ntap-20200702-0005/","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2020-01-21T23:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7040","summary":"storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)","cvss":8.1,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.1,"cvss_v4":null,"epss":0.05192,"ranking_epss":0.89937,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00054.html","http://www.openwall.com/lists/oss-security/2020/01/20/3","http://www.openwall.com/lists/oss-security/2020/01/21/2","http://www.openwall.com/lists/oss-security/2020/01/22/2","http://www.openwall.com/lists/oss-security/2020/01/22/3","http://www.openwall.com/lists/oss-security/2020/01/23/1","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-7040","https://lists.debian.org/debian-lts-announce/2020/02/msg00003.html","https://seclists.org/oss-sec/2020/q1/20","https://usn.ubuntu.com/4508-1/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00054.html","http://www.openwall.com/lists/oss-security/2020/01/20/3","http://www.openwall.com/lists/oss-security/2020/01/21/2","http://www.openwall.com/lists/oss-security/2020/01/22/2","http://www.openwall.com/lists/oss-security/2020/01/22/3","http://www.openwall.com/lists/oss-security/2020/01/23/1","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-7040","https://lists.debian.org/debian-lts-announce/2020/02/msg00003.html","https://seclists.org/oss-sec/2020/q1/20","https://usn.ubuntu.com/4508-1/"],"published_time":"2020-01-21T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-5202","summary":"apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html","http://www.openwall.com/lists/oss-security/2020/01/20/4","http://www.openwall.com/lists/oss-security/2020/01/20/4","https://seclists.org/oss-sec/2020/q1/21","https://security-tracker.debian.org/tracker/CVE-2020-5202","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html","http://www.openwall.com/lists/oss-security/2020/01/20/4","http://www.openwall.com/lists/oss-security/2020/01/20/4","https://seclists.org/oss-sec/2020/q1/21","https://security-tracker.debian.org/tracker/CVE-2020-5202"],"published_time":"2020-01-21T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14902","summary":"There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.","cvss":5.4,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":5.4,"cvss_v4":null,"epss":0.03503,"ranking_epss":0.87628,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/","https://security.gentoo.org/glsa/202003-52","https://security.netapp.com/advisory/ntap-20200122-0001/","https://usn.ubuntu.com/4244-1/","https://www.samba.org/samba/security/CVE-2019-14902.html","https://www.synology.com/security/advisory/Synology_SA_20_01","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/","https://security.gentoo.org/glsa/202003-52","https://security.netapp.com/advisory/ntap-20200122-0001/","https://usn.ubuntu.com/4244-1/","https://www.samba.org/samba/security/CVE-2019-14902.html","https://www.synology.com/security/advisory/Synology_SA_20_01"],"published_time":"2020-01-21T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18932","summary":"log.c in Squid Analysis Report Generator (sarg) through 2.3.11 allows local privilege escalation. By default, it uses a fixed temporary directory /tmp/sarg. As the root user, sarg creates this directory or reuses an existing one in an insecure manner. An attacker can pre-create the directory, and place symlinks in it (after winning a /tmp/sarg/denied.int_unsort race condition). The outcome will be corrupted or newly created files in privileged file system locations.","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00063.html","http://www.openwall.com/lists/oss-security/2020/01/20/6","http://www.openwall.com/lists/oss-security/2020/01/20/6","http://www.openwall.com/lists/oss-security/2020/01/27/1","https://bugzilla.suse.com/show_bug.cgi?id=1150554","https://seclists.org/oss-sec/2020/q1/23","https://security.gentoo.org/glsa/202007-32","https://sourceforge.net/projects/sarg/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00063.html","http://www.openwall.com/lists/oss-security/2020/01/20/6","http://www.openwall.com/lists/oss-security/2020/01/20/6","http://www.openwall.com/lists/oss-security/2020/01/27/1","https://bugzilla.suse.com/show_bug.cgi?id=1150554","https://seclists.org/oss-sec/2020/q1/23","https://security.gentoo.org/glsa/202007-32","https://sourceforge.net/projects/sarg/"],"published_time":"2020-01-21T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19344","summary":"There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02308,"ranking_epss":0.8478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/","https://security.gentoo.org/glsa/202003-52","https://security.netapp.com/advisory/ntap-20200122-0001/","https://usn.ubuntu.com/4244-1/","https://www.samba.org/samba/security/CVE-2019-19344.html","https://www.synology.com/security/advisory/Synology_SA_20_01","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/","https://security.gentoo.org/glsa/202003-52","https://security.netapp.com/advisory/ntap-20200122-0001/","https://usn.ubuntu.com/4244-1/","https://www.samba.org/samba/security/CVE-2019-19344.html","https://www.synology.com/security/advisory/Synology_SA_20_01"],"published_time":"2020-01-21T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20386","summary":"An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.","cvss":2.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":2.4,"cvss_v4":null,"epss":0.00152,"ranking_epss":0.3588,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html","https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/","https://security.netapp.com/advisory/ntap-20200210-0002/","https://usn.ubuntu.com/4269-1/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html","https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/","https://security.netapp.com/advisory/ntap-20200210-0002/","https://usn.ubuntu.com/4269-1/"],"published_time":"2020-01-21T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17361","summary":"In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.","cvss":9.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.8,"cvss_v4":null,"epss":0.18518,"ranking_epss":0.95259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html","https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix","https://github.com/saltstack/salt/commits/master","https://usn.ubuntu.com/4459-1/","https://www.debian.org/security/2020/dsa-4676","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html","https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix","https://github.com/saltstack/salt/commits/master","https://usn.ubuntu.com/4459-1/","https://www.debian.org/security/2020/dsa-4676"],"published_time":"2020-01-17T02:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7039","summary":"tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.","cvss":5.6,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00831,"ranking_epss":0.74607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","http://www.openwall.com/lists/oss-security/2020/01/16/2","https://access.redhat.com/errata/RHSA-2020:0348","https://access.redhat.com/errata/RHSA-2020:0775","https://gitlab.freedesktop.org/slirp/libslirp/commit/2655fffed7a9e765bcb4701dd876e9dab975f289","https://gitlab.freedesktop.org/slirp/libslirp/commit/82ebe9c370a0e2970fb5695aa19aa5214a6a1c80","https://gitlab.freedesktop.org/slirp/libslirp/commit/ce131029d6d4a405cb7d3ac6716d03e58fb4a5d9","https://lists.debian.org/debian-lts-announce/2020/01/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/02/msg00012.html","https://seclists.org/bugtraq/2020/Feb/0","https://security.gentoo.org/glsa/202005-02","https://usn.ubuntu.com/4283-1/","https://www.debian.org/security/2020/dsa-4616","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html","http://www.openwall.com/lists/oss-security/2020/01/16/2","https://access.redhat.com/errata/RHSA-2020:0348","https://access.redhat.com/errata/RHSA-2020:0775","https://gitlab.freedesktop.org/slirp/libslirp/commit/2655fffed7a9e765bcb4701dd876e9dab975f289","https://gitlab.freedesktop.org/slirp/libslirp/commit/82ebe9c370a0e2970fb5695aa19aa5214a6a1c80","https://gitlab.freedesktop.org/slirp/libslirp/commit/ce131029d6d4a405cb7d3ac6716d03e58fb4a5d9","https://lists.debian.org/debian-lts-announce/2020/01/msg00022.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/02/msg00012.html","https://seclists.org/bugtraq/2020/Feb/0","https://security.gentoo.org/glsa/202005-02","https://usn.ubuntu.com/4283-1/","https://www.debian.org/security/2020/dsa-4616"],"published_time":"2020-01-16T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7044","summary":"In Wireshark 3.2.x before 3.2.1, the WASSP dissector could crash. This was addressed in epan/dissectors/packet-wassp.c by using >= and <= to resolve off-by-one errors.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00664,"ranking_epss":0.71236,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16324","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f90a3720b73ca140403315126e2a478c4f70ca03","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.wireshark.org/security/wnpa-sec-2020-01.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16324","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f90a3720b73ca140403315126e2a478c4f70ca03","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.wireshark.org/security/wnpa-sec-2020-01.html"],"published_time":"2020-01-16T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-7106","summary":"Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.04094,"ranking_epss":0.88597,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00032.html","https://github.com/Cacti/cacti/issues/3191","https://lists.debian.org/debian-lts-announce/2020/01/msg00014.html","https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/","https://security.gentoo.org/glsa/202003-40","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00032.html","https://github.com/Cacti/cacti/issues/3191","https://lists.debian.org/debian-lts-announce/2020/01/msg00014.html","https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/","https://security.gentoo.org/glsa/202003-40"],"published_time":"2020-01-16T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2654","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00339,"ranking_epss":0.56738,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2659","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00293,"ranking_epss":0.5267,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2601","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).","cvss":6.8,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00637,"ranking_epss":0.70531,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2604","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).","cvss":8.1,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01699,"ranking_epss":0.82317,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpujul2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpujul2021.html"],"published_time":"2020-01-15T17:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2583","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00519,"ranking_epss":0.66839,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2590","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00449,"ranking_epss":0.6364,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2593","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.0064,"ranking_epss":0.70595,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","https://access.redhat.com/errata/RHSA-2020:0122","https://access.redhat.com/errata/RHSA-2020:0128","https://access.redhat.com/errata/RHSA-2020:0157","https://access.redhat.com/errata/RHSA-2020:0196","https://access.redhat.com/errata/RHSA-2020:0202","https://access.redhat.com/errata/RHSA-2020:0231","https://access.redhat.com/errata/RHSA-2020:0232","https://access.redhat.com/errata/RHSA-2020:0465","https://access.redhat.com/errata/RHSA-2020:0467","https://access.redhat.com/errata/RHSA-2020:0468","https://access.redhat.com/errata/RHSA-2020:0469","https://access.redhat.com/errata/RHSA-2020:0470","https://access.redhat.com/errata/RHSA-2020:0541","https://access.redhat.com/errata/RHSA-2020:0632","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","https://seclists.org/bugtraq/2020/Feb/22","https://seclists.org/bugtraq/2020/Jan/24","https://security.gentoo.org/glsa/202101-19","https://security.netapp.com/advisory/ntap-20200122-0003/","https://usn.ubuntu.com/4257-1/","https://www.debian.org/security/2020/dsa-4605","https://www.debian.org/security/2020/dsa-4621","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-2574","summary":"Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36951,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html","http://www.openwall.com/lists/oss-security/2020/09/29/1","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200122-0002/","https://usn.ubuntu.com/4250-1/","https://usn.ubuntu.com/4250-2/","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html","http://www.openwall.com/lists/oss-security/2020/09/29/1","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20200122-0002/","https://usn.ubuntu.com/4250-1/","https://usn.ubuntu.com/4250-2/","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2020-01-15T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19727","summary":"SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.14216,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html","https://bugzilla.suse.com/show_bug.cgi?id=1155784","https://lists.schedmd.com/pipermail/slurm-announce/","https://www.schedmd.com/news.php","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html","https://bugzilla.suse.com/show_bug.cgi?id=1155784","https://lists.schedmd.com/pipermail/slurm-announce/","https://www.schedmd.com/news.php"],"published_time":"2020-01-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19728","summary":"SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges.","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00435,"ranking_epss":0.62966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html","https://bugzilla.suse.com/show_bug.cgi?id=1159692","https://lists.schedmd.com/pipermail/slurm-announce/","https://www.debian.org/security/2021/dsa-4841","https://www.schedmd.com/news.php","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html","https://bugzilla.suse.com/show_bug.cgi?id=1159692","https://lists.schedmd.com/pipermail/slurm-announce/","https://www.debian.org/security/2021/dsa-4841","https://www.schedmd.com/news.php"],"published_time":"2020-01-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6377","summary":"Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02899,"ranking_epss":0.8637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://access.redhat.com/errata/RHSA-2020:0084","https://chromereleases.googleblog.com/2020/01/stable-channel-update-for-desktop.html","https://crbug.com/1029462","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSUXNEUS6N42UJNQVCQSTSM6CSW2REPG/","https://seclists.org/bugtraq/2020/Jan/27","https://security.gentoo.org/glsa/202003-08","https://www.debian.org/security/2020/dsa-4606","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://access.redhat.com/errata/RHSA-2020:0084","https://chromereleases.googleblog.com/2020/01/stable-channel-update-for-desktop.html","https://crbug.com/1029462","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSUXNEUS6N42UJNQVCQSTSM6CSW2REPG/","https://seclists.org/bugtraq/2020/Jan/27","https://security.gentoo.org/glsa/202003-08","https://www.debian.org/security/2020/dsa-4606"],"published_time":"2020-01-10T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-1765","summary":"An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.","cvss":3.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00634,"ranking_epss":0.70435,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-01/","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","https://otrs.com/release-notes/otrs-security-advisory-2020-01/"],"published_time":"2020-01-10T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20372","summary":"NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.3,"cvss_v4":null,"epss":0.70833,"ranking_epss":0.98703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00013.html","http://nginx.org/en/CHANGES","http://seclists.org/fulldisclosure/2021/Sep/36","https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf","https://duo.com/docs/dng-notes#version-1.5.4-january-2020","https://github.com/kubernetes/ingress-nginx/pull/4859","https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e","https://security.netapp.com/advisory/ntap-20200127-0003/","https://support.apple.com/kb/HT212818","https://usn.ubuntu.com/4235-1/","https://usn.ubuntu.com/4235-2/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00013.html","http://nginx.org/en/CHANGES","http://seclists.org/fulldisclosure/2021/Sep/36","https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf","https://duo.com/docs/dng-notes#version-1.5.4-january-2020","https://github.com/kubernetes/ingress-nginx/pull/4859","https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e","https://security.netapp.com/advisory/ntap-20200127-0003/","https://support.apple.com/kb/HT212818","https://usn.ubuntu.com/4235-1/","https://usn.ubuntu.com/4235-2/"],"published_time":"2020-01-09T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17012","summary":"Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02152,"ranking_epss":0.84276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1449736%2C1533957%2C1560667%2C1567209%2C1580288%2C1585760%2C1592502","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1449736%2C1533957%2C1560667%2C1567209%2C1580288%2C1585760%2C1592502","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17021","summary":"During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.","cvss":5.3,"cvss_version":3.0,"cvss_v2":2.6,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00472,"ranking_epss":0.64681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html","http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1599008","https://seclists.org/bugtraq/2020/Jan/18","https://www.mozilla.org/security/advisories/mfsa2020-01/","https://www.mozilla.org/security/advisories/mfsa2020-02/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html","http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1599008","https://seclists.org/bugtraq/2020/Jan/18","https://www.mozilla.org/security/advisories/mfsa2020-01/","https://www.mozilla.org/security/advisories/mfsa2020-02/"],"published_time":"2020-01-08T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17024","summary":"Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03276,"ranking_epss":0.87192,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html","http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html","https://access.redhat.com/errata/RHSA-2020:0085","https://access.redhat.com/errata/RHSA-2020:0086","https://access.redhat.com/errata/RHSA-2020:0111","https://access.redhat.com/errata/RHSA-2020:0120","https://access.redhat.com/errata/RHSA-2020:0123","https://access.redhat.com/errata/RHSA-2020:0127","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826","https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html","https://seclists.org/bugtraq/2020/Jan/12","https://seclists.org/bugtraq/2020/Jan/18","https://seclists.org/bugtraq/2020/Jan/26","https://security.gentoo.org/glsa/202003-02","https://usn.ubuntu.com/4234-1/","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.debian.org/security/2020/dsa-4600","https://www.debian.org/security/2020/dsa-4603","https://www.mozilla.org/security/advisories/mfsa2020-01/","https://www.mozilla.org/security/advisories/mfsa2020-02/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html","http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html","https://access.redhat.com/errata/RHSA-2020:0085","https://access.redhat.com/errata/RHSA-2020:0086","https://access.redhat.com/errata/RHSA-2020:0111","https://access.redhat.com/errata/RHSA-2020:0120","https://access.redhat.com/errata/RHSA-2020:0123","https://access.redhat.com/errata/RHSA-2020:0127","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826","https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html","https://seclists.org/bugtraq/2020/Jan/12","https://seclists.org/bugtraq/2020/Jan/18","https://seclists.org/bugtraq/2020/Jan/26","https://security.gentoo.org/glsa/202003-02","https://usn.ubuntu.com/4234-1/","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.debian.org/security/2020/dsa-4600","https://www.debian.org/security/2020/dsa-4603","https://www.mozilla.org/security/advisories/mfsa2020-01/","https://www.mozilla.org/security/advisories/mfsa2020-02/"],"published_time":"2020-01-08T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17005","summary":"The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02867,"ranking_epss":0.86281,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1584170","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1584170","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17008","summary":"When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00854,"ranking_epss":0.7498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1546331","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1546331","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17009","summary":"When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1510494","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1510494","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17010","summary":"Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01329,"ranking_epss":0.79967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1581084","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1581084","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17011","summary":"Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01329,"ranking_epss":0.79967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1591334","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","https://access.redhat.com/errata/RHSA-2020:0292","https://access.redhat.com/errata/RHSA-2020:0295","https://bugzilla.mozilla.org/show_bug.cgi?id=1591334","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6609","summary":"GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00557,"ranking_epss":0.6823,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issue-544834443","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issue-544834443"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6610","summary":"GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00528,"ranking_epss":0.67204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6611","summary":"GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00579,"ranking_epss":0.68917,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6612","summary":"GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00605,"ranking_epss":0.69653,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6613","summary":"GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00605,"ranking_epss":0.69653,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6614","summary":"GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00605,"ranking_epss":0.69653,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-6615","summary":"GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00672,"ranking_epss":0.71415,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html","https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223"],"published_time":"2020-01-08T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11745","summary":"When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00806,"ranking_epss":0.74195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html","https://access.redhat.com/errata/RHSA-2020:0243","https://access.redhat.com/errata/RHSA-2020:0466","https://bugzilla.mozilla.org/show_bug.cgi?id=1586176","https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf","https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://security.gentoo.org/glsa/202003-37","https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html","https://access.redhat.com/errata/RHSA-2020:0243","https://access.redhat.com/errata/RHSA-2020:0466","https://bugzilla.mozilla.org/show_bug.cgi?id=1586176","https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf","https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html","https://security.gentoo.org/glsa/202003-02","https://security.gentoo.org/glsa/202003-10","https://security.gentoo.org/glsa/202003-37","https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04","https://usn.ubuntu.com/4241-1/","https://usn.ubuntu.com/4335-1/","https://www.mozilla.org/security/advisories/mfsa2019-36/","https://www.mozilla.org/security/advisories/mfsa2019-37/","https://www.mozilla.org/security/advisories/mfsa2019-38/"],"published_time":"2020-01-08T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20367","summary":"nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).","cvss":9.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00879,"ranking_epss":0.7538,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html","https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b","https://lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550%40%3Cdev.tomee.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/02/msg00027.html","https://lists.freedesktop.org/archives/libbsd/2019-August/000229.html","https://usn.ubuntu.com/4243-1/","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html","https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b","https://lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5%40%3Cdev.tomee.apache.org%3E","https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550%40%3Cdev.tomee.apache.org%3E","https://lists.debian.org/debian-lts-announce/2021/02/msg00027.html","https://lists.freedesktop.org/archives/libbsd/2019-August/000229.html","https://usn.ubuntu.com/4243-1/"],"published_time":"2020-01-08T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5188","summary":"A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/","https://security.netapp.com/advisory/ntap-20220506-0001/","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973","https://usn.ubuntu.com/4249-1/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/","https://security.netapp.com/advisory/ntap-20220506-0001/","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973","https://usn.ubuntu.com/4249-1/"],"published_time":"2020-01-08T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18179","summary":"An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.12, and Community Edition 5.0.x through 5.0.38 and 6.0.x through 6.0.23. An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, even tickets in a queue where the attacker doesn't have permissions.","cvss":3.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00403,"ranking_epss":0.60895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://community.otrs.com/security-advisory-2019-14-security-update-for-otrs-framework/","https://lists.debian.org/debian-lts-announce/2020/01/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html","https://community.otrs.com/security-advisory-2019-14-security-update-for-otrs-framework/","https://lists.debian.org/debian-lts-announce/2020/01/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"],"published_time":"2020-01-06T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5844","summary":"Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00966,"ranking_epss":0.76623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html","https://crbug.com/915206","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html","https://crbug.com/915206"],"published_time":"2020-01-03T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5845","summary":"Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00966,"ranking_epss":0.76623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html","https://crbug.com/915197","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html","https://crbug.com/915197"],"published_time":"2020-01-03T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5846","summary":"Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00966,"ranking_epss":0.76623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html","https://crbug.com/915218","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html","https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html","https://crbug.com/915218"],"published_time":"2020-01-03T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-5496","summary":"FontForge 20190801 has a heap-based buffer overflow in the Type2NotDefSplines() function in splinesave.c.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00204,"ranking_epss":0.42618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html","https://github.com/fontforge/fontforge/issues/4085","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://security.gentoo.org/glsa/202004-14","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html","https://github.com/fontforge/fontforge/issues/4085","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://security.gentoo.org/glsa/202004-14"],"published_time":"2020-01-03T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-5395","summary":"FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00279,"ranking_epss":0.51326,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html","https://github.com/fontforge/fontforge/issues/4084","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2S75EAVF4KPCH3WFBMZADUAU7EAXA7ZQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MH6PKVQLBKIO7LQPDXB3MKI5I6AMDCN6/","https://security.gentoo.org/glsa/202004-14","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html","https://github.com/fontforge/fontforge/issues/4084","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2S75EAVF4KPCH3WFBMZADUAU7EAXA7ZQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MH6PKVQLBKIO7LQPDXB3MKI5I6AMDCN6/","https://security.gentoo.org/glsa/202004-14"],"published_time":"2020-01-03T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14864","summary":"Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.","cvss":5.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00964,"ranking_epss":0.76587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864","https://github.com/ansible/ansible/issues/63522","https://github.com/ansible/ansible/pull/63527","https://www.debian.org/security/2021/dsa-4950","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864","https://github.com/ansible/ansible/issues/63522","https://github.com/ansible/ansible/pull/63527","https://www.debian.org/security/2021/dsa-4950"],"published_time":"2020-01-02T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19927","summary":"In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.","cvss":6.0,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00205,"ranking_epss":0.42662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927","https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428","https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39","https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4","https://security.netapp.com/advisory/ntap-20200204-0002/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927","https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428","https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39","https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4","https://security.netapp.com/advisory/ntap-20200204-0002/"],"published_time":"2019-12-31T02:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20095","summary":"mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00131,"ranking_epss":0.32548,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc","https://security.netapp.com/advisory/ntap-20200204-0002/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc","https://security.netapp.com/advisory/ntap-20200204-0002/"],"published_time":"2019-12-30T05:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20053","summary":"An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00365,"ranking_epss":0.58548,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html","https://github.com/upx/upx/issues/314","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html","https://github.com/upx/upx/issues/314"],"published_time":"2019-12-27T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20009","summary":"An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00556,"ranking_epss":0.68182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issue-541977765","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issue-541977765"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20010","summary":"An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0051,"ranking_epss":0.6644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20011","summary":"An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0051,"ranking_epss":0.6644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20012","summary":"An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00577,"ranking_epss":0.68862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20013","summary":"An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00556,"ranking_epss":0.68182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20014","summary":"An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0051,"ranking_epss":0.6644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-20015","summary":"An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00577,"ranking_epss":0.68862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html","https://github.com/LibreDWG/libredwg/issues/176","https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028"],"published_time":"2019-12-27T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15695","summary":"TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.","cvss":7.2,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.2,"cvss_v4":null,"epss":0.03257,"ranking_epss":0.87154,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2"],"published_time":"2019-12-26T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15691","summary":"TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.","cvss":7.2,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.2,"cvss_v4":null,"epss":0.03684,"ranking_epss":0.87943,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2"],"published_time":"2019-12-26T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15692","summary":"TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.","cvss":7.2,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.2,"cvss_v4":null,"epss":0.05042,"ranking_epss":0.89777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/996356b6c65ca165ee1ea46a571c32a1dc3c3821","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/996356b6c65ca165ee1ea46a571c32a1dc3c3821","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2"],"published_time":"2019-12-26T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15694","summary":"TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.","cvss":7.2,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.2,"cvss_v4":null,"epss":0.06012,"ranking_epss":0.90726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html","https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438","https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1","https://www.openwall.com/lists/oss-security/2019/12/20/2"],"published_time":"2019-12-26T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19965","summary":"In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.","cvss":4.7,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20200204-0002/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20200204-0002/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/"],"published_time":"2019-12-25T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19966","summary":"In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.","cvss":4.6,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00138,"ranking_epss":0.33816,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://security.netapp.com/advisory/ntap-20200204-0002/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://security.netapp.com/advisory/ntap-20200204-0002/"],"published_time":"2019-12-25T04:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19925","summary":"zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07012,"ranking_epss":0.91496,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-12-24T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19923","summary":"flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.062,"ranking_epss":0.90887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-12-24T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19948","summary":"In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html","https://github.com/ImageMagick/ImageMagick/issues/1562","https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html","https://usn.ubuntu.com/4549-1/","https://www.debian.org/security/2020/dsa-4712","https://www.debian.org/security/2020/dsa-4715","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html","https://github.com/ImageMagick/ImageMagick/issues/1562","https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html","https://usn.ubuntu.com/4549-1/","https://www.debian.org/security/2020/dsa-4712","https://www.debian.org/security/2020/dsa-4715"],"published_time":"2019-12-24T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19949","summary":"In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.","cvss":9.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00342,"ranking_epss":0.56897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html","https://github.com/ImageMagick/ImageMagick/issues/1561","https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html","https://usn.ubuntu.com/4549-1/","https://www.debian.org/security/2020/dsa-4712","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html","https://github.com/ImageMagick/ImageMagick/issues/1561","https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html","https://usn.ubuntu.com/4549-1/","https://www.debian.org/security/2020/dsa-4712"],"published_time":"2019-12-24T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19950","summary":"In GraphicsMagick 1.4 snapshot-20190403 Q8, there is a use-after-free in ThrowException and ThrowLoggedException of magick/error.c.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01204,"ranking_epss":0.78964,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/44ab7f6c20b4","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html","https://sourceforge.net/p/graphicsmagick/bugs/603/","https://www.debian.org/security/2020/dsa-4640","http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/44ab7f6c20b4","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html","https://sourceforge.net/p/graphicsmagick/bugs/603/","https://www.debian.org/security/2020/dsa-4640"],"published_time":"2019-12-24T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19951","summary":"In GraphicsMagick 1.4 snapshot-20190423 Q8, there is a heap-based buffer overflow in the function ImportRLEPixels of coders/miff.c.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0144,"ranking_epss":0.80754,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/bc99af93614d","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html","https://sourceforge.net/p/graphicsmagick/bugs/608/","https://www.debian.org/security/2020/dsa-4640","http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/bc99af93614d","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html","https://sourceforge.net/p/graphicsmagick/bugs/608/","https://www.debian.org/security/2020/dsa-4640"],"published_time":"2019-12-24T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19953","summary":"In GraphicsMagick 1.4 snapshot-20191208 Q8, there is a heap-based buffer over-read in the function EncodeImage of coders/pict.c.","cvss":9.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":9.1,"cvss_v4":null,"epss":0.01306,"ranking_epss":0.79795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/28f8bacd4bbf","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html","https://sourceforge.net/p/graphicsmagick/bugs/617/","https://www.debian.org/security/2020/dsa-4640","http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/28f8bacd4bbf","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html","https://sourceforge.net/p/graphicsmagick/bugs/617/","https://www.debian.org/security/2020/dsa-4640"],"published_time":"2019-12-24T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12418","summary":"When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.5783,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html","https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html","https://seclists.org/bugtraq/2019/Dec/43","https://security.gentoo.org/glsa/202003-43","https://security.netapp.com/advisory/ntap-20200107-0001/","https://support.f5.com/csp/article/K10107360?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4251-1/","https://www.debian.org/security/2019/dsa-4596","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html","https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html","https://seclists.org/bugtraq/2019/Dec/43","https://security.gentoo.org/glsa/202003-43","https://security.netapp.com/advisory/ntap-20200107-0001/","https://support.f5.com/csp/article/K10107360?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4251-1/","https://www.debian.org/security/2019/dsa-4596","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-12-23T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17563","summary":"When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0326,"ranking_epss":0.87159,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html","https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://seclists.org/bugtraq/2019/Dec/43","https://security.gentoo.org/glsa/202003-43","https://security.netapp.com/advisory/ntap-20200107-0001/","https://usn.ubuntu.com/4251-1/","https://www.debian.org/security/2019/dsa-4596","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html","https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E","https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html","https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html","https://seclists.org/bugtraq/2019/Dec/43","https://security.gentoo.org/glsa/202003-43","https://security.netapp.com/advisory/ntap-20200107-0001/","https://usn.ubuntu.com/4251-1/","https://www.debian.org/security/2019/dsa-4596","https://www.debian.org/security/2020/dsa-4680","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2019-12-23T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18388","summary":"A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30721,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18388","https://bugzilla.redhat.com/show_bug.cgi?id=1765578","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/0d9a2c88dc3a70023541b3260b9f00c982abda16","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#diff-content-3cd772559e0d73afa136d6818023cfd0c4c8ecc0","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18388","https://bugzilla.redhat.com/show_bug.cgi?id=1765578","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/0d9a2c88dc3a70023541b3260b9f00c982abda16","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#diff-content-3cd772559e0d73afa136d6818023cfd0c4c8ecc0","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"],"published_time":"2019-12-23T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18389","summary":"A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00338,"ranking_epss":0.56684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18389","https://bugzilla.redhat.com/show_bug.cgi?id=1765577","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=9c280a28651507e6ef87b17b90d47b6af3a4ab7d","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18389","https://bugzilla.redhat.com/show_bug.cgi?id=1765577","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=9c280a28651507e6ef87b17b90d47b6af3a4ab7d","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"],"published_time":"2019-12-23T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18390","summary":"An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18390","https://bugzilla.redhat.com/show_bug.cgi?id=1765584","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18390","https://bugzilla.redhat.com/show_bug.cgi?id=1765584","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"],"published_time":"2019-12-23T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18391","summary":"A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0011,"ranking_epss":0.29303,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18391","https://bugzilla.redhat.com/show_bug.cgi?id=1765589","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/2abeb1802e3c005b17a7123e382171b3fb665971","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html","https://access.redhat.com/security/cve/cve-2019-18391","https://bugzilla.redhat.com/show_bug.cgi?id=1765589","https://gitlab.freedesktop.org/virgl/virglrenderer/commit/2abeb1802e3c005b17a7123e382171b3fb665971","https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08","https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"],"published_time":"2019-12-23T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11045","summary":"In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \\0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.41483,"ranking_epss":0.97416,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html","https://bugs.php.net/bug.php?id=78863","https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.netapp.com/advisory/ntap-20200103-0002/","https://usn.ubuntu.com/4239-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html","https://bugs.php.net/bug.php?id=78863","https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.netapp.com/advisory/ntap-20200103-0002/","https://usn.ubuntu.com/4239-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.tenable.com/security/tns-2021-14"],"published_time":"2019-12-23T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11046","summary":"In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.","cvss":3.7,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":3.7,"cvss_v4":null,"epss":0.08245,"ranking_epss":0.92238,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html","https://bugs.php.net/bug.php?id=78878","https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.netapp.com/advisory/ntap-20200103-0002/","https://support.f5.com/csp/article/K48866433?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4239-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html","https://bugs.php.net/bug.php?id=78878","https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.netapp.com/advisory/ntap-20200103-0002/","https://support.f5.com/csp/article/K48866433?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4239-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.tenable.com/security/tns-2021-14"],"published_time":"2019-12-23T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11050","summary":"When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.","cvss":4.8,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":4.8,"cvss_v4":null,"epss":0.03196,"ranking_epss":0.8701,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html","https://bugs.php.net/bug.php?id=78793","https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.netapp.com/advisory/ntap-20200103-0002/","https://usn.ubuntu.com/4239-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html","https://bugs.php.net/bug.php?id=78793","https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/","https://seclists.org/bugtraq/2020/Feb/27","https://seclists.org/bugtraq/2020/Feb/31","https://seclists.org/bugtraq/2021/Jan/3","https://security.netapp.com/advisory/ntap-20200103-0002/","https://usn.ubuntu.com/4239-1/","https://www.debian.org/security/2020/dsa-4626","https://www.debian.org/security/2020/dsa-4628","https://www.tenable.com/security/tns-2021-14"],"published_time":"2019-12-23T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19926","summary":"multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08338,"ranking_epss":0.92299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://usn.ubuntu.com/4298-2/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://usn.ubuntu.com/4298-2/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-12-23T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19917","summary":"Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/","https://lists.gnu.org/archive/html/lout-users/2019-12/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/","https://lists.gnu.org/archive/html/lout-users/2019-12/msg00002.html"],"published_time":"2019-12-20T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19918","summary":"Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/","https://lists.gnu.org/archive/html/lout-users/2019-12/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/","https://lists.gnu.org/archive/html/lout-users/2019-12/msg00001.html"],"published_time":"2019-12-20T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17571","summary":"Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.36965,"ranking_epss":0.97165,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html","https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E","https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e%40%3Cuser.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e%40%3Clog4j-user.logging.apache.org%3E","https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740%40%3Ccommits.druid.apache.org%3E","https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2%40%3Cdev.jena.apache.org%3E","https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f%40%3Cpluto-dev.portals.apache.org%3E","https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc%40%3Ccommits.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d%40%3Ccommon-dev.hadoop.apache.org%3E","https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159%40%3Cnotifications.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E","https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47%40%3Cdev.tinkerpop.apache.org%3E","https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b%40%3Cpluto-dev.portals.apache.org%3E","https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94%40%3Cpluto-scm.portals.apache.org%3E","https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c%40%3Cnotifications.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80%40%3Cpluto-dev.portals.apache.org%3E","https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E","https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc%40%3Cissues.bookkeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html","https://security.netapp.com/advisory/ntap-20200110-0001/","https://usn.ubuntu.com/4495-1/","https://www.debian.org/security/2020/dsa-4686","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html","https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E","https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e%40%3Cuser.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e%40%3Clog4j-user.logging.apache.org%3E","https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740%40%3Ccommits.druid.apache.org%3E","https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2%40%3Cdev.jena.apache.org%3E","https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f%40%3Cpluto-dev.portals.apache.org%3E","https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882%40%3Cusers.activemq.apache.org%3E","https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc%40%3Ccommits.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d%40%3Ccommon-dev.hadoop.apache.org%3E","https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd%40%3Cdev.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159%40%3Cnotifications.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E","https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47%40%3Cdev.tinkerpop.apache.org%3E","https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679%40%3Cissues.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347%40%3Ccommon-issues.hadoop.apache.org%3E","https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b%40%3Cpluto-dev.portals.apache.org%3E","https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3%40%3Cusers.kafka.apache.org%3E","https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374%40%3Cissues.activemq.apache.org%3E","https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94%40%3Cpluto-scm.portals.apache.org%3E","https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f%40%3Ccommits.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c%40%3Cnotifications.zookeeper.apache.org%3E","https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f%40%3Cdev.tika.apache.org%3E","https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80%40%3Cpluto-dev.portals.apache.org%3E","https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9%40%3Cjira.kafka.apache.org%3E","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E","https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc%40%3Cissues.bookkeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html","https://security.netapp.com/advisory/ntap-20200110-0001/","https://usn.ubuntu.com/4495-1/","https://www.debian.org/security/2020/dsa-4686","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html"],"published_time":"2019-12-20T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16782","summary":"There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.","cvss":6.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.3,"cvss_v4":null,"epss":0.01251,"ranking_epss":0.79357,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html","http://www.openwall.com/lists/oss-security/2019/12/18/2","http://www.openwall.com/lists/oss-security/2019/12/18/3","http://www.openwall.com/lists/oss-security/2019/12/19/3","http://www.openwall.com/lists/oss-security/2020/04/08/1","http://www.openwall.com/lists/oss-security/2020/04/09/2","https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38","https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html","http://www.openwall.com/lists/oss-security/2019/12/18/2","http://www.openwall.com/lists/oss-security/2019/12/18/3","http://www.openwall.com/lists/oss-security/2019/12/19/3","http://www.openwall.com/lists/oss-security/2020/04/08/1","http://www.openwall.com/lists/oss-security/2020/04/09/2","https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38","https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/"],"published_time":"2019-12-18T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19880","summary":"exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08438,"ranking_epss":0.92355,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54","https://security.netapp.com/advisory/ntap-20200114-0001/","https://usn.ubuntu.com/4298-1/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://access.redhat.com/errata/RHSA-2020:0514","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54","https://security.netapp.com/advisory/ntap-20200114-0001/","https://usn.ubuntu.com/4298-1/","https://www.debian.org/security/2020/dsa-4638","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-12-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16779","summary":"In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.","cvss":5.8,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.8,"cvss_v4":null,"epss":0.00556,"ranking_epss":0.68179,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html","https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29","https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9","https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html","https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29","https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9","https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html"],"published_time":"2019-12-16T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16777","summary":"Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","cvss":7.7,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00334,"ranking_epss":0.56289,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html","https://access.redhat.com/errata/RHEA-2020:0330","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0602","https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli","https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/","https://security.gentoo.org/glsa/202003-48","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html","https://access.redhat.com/errata/RHEA-2020:0330","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0602","https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli","https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/","https://security.gentoo.org/glsa/202003-48","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2019-12-13T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16775","summary":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","cvss":7.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00684,"ranking_epss":0.717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html","https://access.redhat.com/errata/RHEA-2020:0330","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0602","https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli","https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html","https://access.redhat.com/errata/RHEA-2020:0330","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0602","https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli","https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2019-12-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16776","summary":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","cvss":7.7,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00783,"ranking_epss":0.73787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html","https://access.redhat.com/errata/RHEA-2020:0330","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0602","https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli","https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/","https://www.oracle.com/security-alerts/cpujan2020.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html","https://access.redhat.com/errata/RHEA-2020:0330","https://access.redhat.com/errata/RHSA-2020:0573","https://access.redhat.com/errata/RHSA-2020:0579","https://access.redhat.com/errata/RHSA-2020:0597","https://access.redhat.com/errata/RHSA-2020:0602","https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli","https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/","https://www.oracle.com/security-alerts/cpujan2020.html"],"published_time":"2019-12-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17358","summary":"Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":8.1,"cvss_v4":null,"epss":0.02298,"ranking_epss":0.84753,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-17358","https://github.com/Cacti/cacti/blob/79f29cddb5eb05cbaff486cd634285ef1fed9326/lib/functions.php#L3109","https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8","https://github.com/Cacti/cacti/issues/3026","https://lists.debian.org/debian-lts-announce/2019/12/msg00014.html","https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17358.html","https://seclists.org/bugtraq/2020/Jan/25","https://security.gentoo.org/glsa/202003-40","https://www.darkmatter.ae/xen1thlabs/","https://www.debian.org/security/2020/dsa-4604","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-17358","https://github.com/Cacti/cacti/blob/79f29cddb5eb05cbaff486cd634285ef1fed9326/lib/functions.php#L3109","https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8","https://github.com/Cacti/cacti/issues/3026","https://lists.debian.org/debian-lts-announce/2019/12/msg00014.html","https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17358.html","https://seclists.org/bugtraq/2020/Jan/25","https://security.gentoo.org/glsa/202003-40","https://www.darkmatter.ae/xen1thlabs/","https://www.debian.org/security/2020/dsa-4604"],"published_time":"2019-12-12T14:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19583","summary":"An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02069,"ranking_epss":0.83968,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/34HBFTYNMQMWIO2GGK7DB6KV4M6R5YPV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5R73AYE53QA32KTMHUVKCX6E52CIS43/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602","https://xenbits.xen.org/xsa/advisory-308.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/34HBFTYNMQMWIO2GGK7DB6KV4M6R5YPV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5R73AYE53QA32KTMHUVKCX6E52CIS43/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602","https://xenbits.xen.org/xsa/advisory-308.html"],"published_time":"2019-12-11T18:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19604","summary":"Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a \"git submodule update\" operation can run commands found in the .gitmodules file of a malicious repository.","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01339,"ranking_epss":0.80034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","http://www.openwall.com/lists/oss-security/2019/12/13/1","https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCYSSCA5ZTEP46SB4XRPSQGFV2L3NKMZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6UGTEOXWIYSM5KDZL74QD2GK6YQNQCP/","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.24.1.txt","https://security.gentoo.org/glsa/202003-30","https://www.debian.org/security/2019/dsa-4581","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","http://www.openwall.com/lists/oss-security/2019/12/13/1","https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCYSSCA5ZTEP46SB4XRPSQGFV2L3NKMZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6UGTEOXWIYSM5KDZL74QD2GK6YQNQCP/","https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.24.1.txt","https://security.gentoo.org/glsa/202003-30","https://www.debian.org/security/2019/dsa-4581"],"published_time":"2019-12-11T00:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14861","summary":"All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.","cvss":5.3,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":5.3,"cvss_v4":null,"epss":0.04997,"ranking_epss":0.89722,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html","http://www.openwall.com/lists/oss-security/2024/06/24/3","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/","https://security.gentoo.org/glsa/202003-52","https://security.netapp.com/advisory/ntap-20191210-0002/","https://usn.ubuntu.com/4217-1/","https://usn.ubuntu.com/4217-2/","https://www.samba.org/samba/security/CVE-2019-14861.html","https://www.synology.com/security/advisory/Synology_SA_19_40","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html","http://www.openwall.com/lists/oss-security/2024/06/24/3","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/","https://security.gentoo.org/glsa/202003-52","https://security.netapp.com/advisory/ntap-20191210-0002/","https://usn.ubuntu.com/4217-1/","https://usn.ubuntu.com/4217-2/","https://www.samba.org/samba/security/CVE-2019-14861.html","https://www.synology.com/security/advisory/Synology_SA_19_40"],"published_time":"2019-12-10T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14870","summary":"All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.","cvss":5.4,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":5.4,"cvss_v4":null,"epss":0.04669,"ranking_epss":0.89337,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/","https://security.gentoo.org/glsa/202003-52","https://security.gentoo.org/glsa/202310-06","https://security.netapp.com/advisory/ntap-20191210-0002/","https://security.netapp.com/advisory/ntap-20230216-0008/","https://usn.ubuntu.com/4217-1/","https://usn.ubuntu.com/4217-2/","https://www.samba.org/samba/security/CVE-2019-14870.html","https://www.synology.com/security/advisory/Synology_SA_19_40","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/","https://security.gentoo.org/glsa/202003-52","https://security.gentoo.org/glsa/202310-06","https://security.netapp.com/advisory/ntap-20191210-0002/","https://security.netapp.com/advisory/ntap-20230216-0008/","https://usn.ubuntu.com/4217-1/","https://usn.ubuntu.com/4217-2/","https://www.samba.org/samba/security/CVE-2019-14870.html","https://www.synology.com/security/advisory/Synology_SA_19_40"],"published_time":"2019-12-10T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14889","summary":"A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.","cvss":7.1,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.1,"cvss_v4":null,"epss":0.01034,"ranking_epss":0.77407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889","https://lists.debian.org/debian-lts-announce/2019/12/msg00020.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JJWJTXVWLLJTVHBPGWL7472S5FWXYQR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EV2ONSPDJCTDVORCB4UGRQUZQQ46JHRN/","https://security.gentoo.org/glsa/202003-27","https://usn.ubuntu.com/4219-1/","https://www.libssh.org/security/advisories/CVE-2019-14889.txt","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889","https://lists.debian.org/debian-lts-announce/2019/12/msg00020.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JJWJTXVWLLJTVHBPGWL7472S5FWXYQR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EV2ONSPDJCTDVORCB4UGRQUZQQ46JHRN/","https://security.gentoo.org/glsa/202003-27","https://usn.ubuntu.com/4219-1/","https://www.libssh.org/security/advisories/CVE-2019-14889.txt","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-12-10T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-1551","summary":"There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.03874,"ranking_epss":0.88249,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html","http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98","https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/","https://seclists.org/bugtraq/2019/Dec/39","https://seclists.org/bugtraq/2019/Dec/46","https://security.gentoo.org/glsa/202004-10","https://security.netapp.com/advisory/ntap-20191210-0001/","https://usn.ubuntu.com/4376-1/","https://usn.ubuntu.com/4504-1/","https://www.debian.org/security/2019/dsa-4594","https://www.debian.org/security/2021/dsa-4855","https://www.openssl.org/news/secadv/20191206.txt","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.tenable.com/security/tns-2019-09","https://www.tenable.com/security/tns-2020-03","https://www.tenable.com/security/tns-2020-11","https://www.tenable.com/security/tns-2021-10","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html","http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98","https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/","https://seclists.org/bugtraq/2019/Dec/39","https://seclists.org/bugtraq/2019/Dec/46","https://security.gentoo.org/glsa/202004-10","https://security.netapp.com/advisory/ntap-20191210-0001/","https://usn.ubuntu.com/4376-1/","https://usn.ubuntu.com/4504-1/","https://www.debian.org/security/2019/dsa-4594","https://www.debian.org/security/2021/dsa-4855","https://www.openssl.org/news/secadv/20191206.txt","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.tenable.com/security/tns-2019-09","https://www.tenable.com/security/tns-2020-03","https://www.tenable.com/security/tns-2020-11","https://www.tenable.com/security/tns-2021-10"],"published_time":"2019-12-06T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-3690","summary":"The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27664,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html","https://bugzilla.suse.com/show_bug.cgi?id=1150734","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html","https://bugzilla.suse.com/show_bug.cgi?id=1150734"],"published_time":"2019-12-05T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19553","summary":"In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00656,"ranking_epss":0.71048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15961","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=34d2e0d5318d0a7e9889498c721639e5cbf4ce45","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.wireshark.org/security/wnpa-sec-2019-22.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15961","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=34d2e0d5318d0a7e9889498c721639e5cbf4ce45","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.wireshark.org/security/wnpa-sec-2019-22.html"],"published_time":"2019-12-05T01:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2015-7542","summary":"A vulnerability exists in libgwenhywfar through 4.12.0 due to the usage of outdated bundled CA certificates.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29836,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174484.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174540.html","http://lists.opensuse.org/opensuse-updates/2018-01/msg00038.html","https://bugzilla.redhat.com/show_bug.cgi?id=1272503","http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174484.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174540.html","http://lists.opensuse.org/opensuse-updates/2018-01/msg00038.html","https://bugzilla.redhat.com/show_bug.cgi?id=1272503"],"published_time":"2019-12-03T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5163","summary":"An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00486,"ranking_epss":0.65416,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956"],"published_time":"2019-12-03T22:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5164","summary":"An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00429,"ranking_epss":0.62547,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958"],"published_time":"2019-12-03T22:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2016-1000104","summary":"A security Bypass vulnerability exists in the FcgidPassHeader Proxy in mod_fcgid through 2016-07-07.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-updates/2016-08/msg00084.html","http://www.openwall.com/lists/oss-security/2016/07/18/6","http://www.securityfocus.com/bid/91822","https://www.tenable.com/security/tns-2017-04","http://lists.opensuse.org/opensuse-updates/2016-08/msg00084.html","http://www.openwall.com/lists/oss-security/2016/07/18/6","http://www.securityfocus.com/bid/91822","https://www.tenable.com/security/tns-2017-04"],"published_time":"2019-12-03T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-13456","summary":"In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the \"Dragonblood\" attack and CVE-2019-9494.","cvss":6.5,"cvss_version":3.0,"cvss_v2":2.9,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00249,"ranking_epss":0.48238,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html","https://bugzilla.redhat.com/show_bug.cgi?id=1737663","https://freeradius.org/security/","https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa","https://wpa3.mathyvanhoef.com","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html","https://bugzilla.redhat.com/show_bug.cgi?id=1737663","https://freeradius.org/security/","https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa","https://wpa3.mathyvanhoef.com"],"published_time":"2019-12-03T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19530","summary":"In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00077,"ranking_epss":0.22988,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"],"published_time":"2019-12-03T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19531","summary":"In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.","cvss":6.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.33993,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc05481b2fcabaaeccf63e32ac1baab54e5b6963","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc05481b2fcabaaeccf63e32ac1baab54e5b6963","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"],"published_time":"2019-12-03T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19535","summary":"In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.","cvss":4.6,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-12-03T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19536","summary":"In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.","cvss":4.6,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.6,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23693,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"],"published_time":"2019-12-03T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19523","summary":"In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"],"published_time":"2019-12-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19525","summary":"In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fd25e6fc035f4b04b75bca6d7e8daa069603a76","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fd25e6fc035f4b04b75bca6d7e8daa069603a76","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"],"published_time":"2019-12-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19526","summary":"In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.18184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc","https://usn.ubuntu.com/4226-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc","https://usn.ubuntu.com/4226-1/"],"published_time":"2019-12-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19527","summary":"In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25854,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2019/12/03/4","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"],"published_time":"2019-12-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19462","summary":"relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28511,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lore.kernel.org/lkml/20191129013745.7168-1-dja%40axtens.net/","https://security.netapp.com/advisory/ntap-20210129-0004/","https://syzkaller-ppc64.appspot.com/bug?id=1c09906c83a8ea811a9e318c2a4f8e243becc6f8","https://syzkaller-ppc64.appspot.com/bug?id=b05b4d005191cc375cdf848c3d4d980308d50531","https://syzkaller.appspot.com/bug?id=e4265490d26d6c01cd9bc79dc915ef0a1bf15046","https://syzkaller.appspot.com/bug?id=f4d1cb4330bd3ddf4a628332b4285407b2eedd7b","https://usn.ubuntu.com/4414-1/","https://usn.ubuntu.com/4425-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lore.kernel.org/lkml/20191129013745.7168-1-dja%40axtens.net/","https://security.netapp.com/advisory/ntap-20210129-0004/","https://syzkaller-ppc64.appspot.com/bug?id=1c09906c83a8ea811a9e318c2a4f8e243becc6f8","https://syzkaller-ppc64.appspot.com/bug?id=b05b4d005191cc375cdf848c3d4d980308d50531","https://syzkaller.appspot.com/bug?id=e4265490d26d6c01cd9bc79dc915ef0a1bf15046","https://syzkaller.appspot.com/bug?id=f4d1cb4330bd3ddf4a628332b4285407b2eedd7b","https://usn.ubuntu.com/4414-1/","https://usn.ubuntu.com/4425-1/","https://usn.ubuntu.com/4439-1/","https://usn.ubuntu.com/4440-1/","https://www.debian.org/security/2020/dsa-4698","https://www.debian.org/security/2020/dsa-4699"],"published_time":"2019-11-30T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19451","summary":"When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35983,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00019.html","https://gitlab.gnome.org/GNOME/dia/issues/428","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KTGLGWHINMTDRFL7RZAJZJM5YSVXUXWW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKLQU2XBM4BGRKOF3L4C5QCPBUNTKEUN/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00019.html","https://gitlab.gnome.org/GNOME/dia/issues/428","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KTGLGWHINMTDRFL7RZAJZJM5YSVXUXWW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKLQU2XBM4BGRKOF3L4C5QCPBUNTKEUN/"],"published_time":"2019-11-29T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14895","summary":"A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.","cvss":8.0,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00703,"ranking_epss":0.72096,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html","http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html","https://access.redhat.com/errata/RHSA-2020:0328","https://access.redhat.com/errata/RHSA-2020:0339","https://access.redhat.com/errata/RHSA-2020:0374","https://access.redhat.com/errata/RHSA-2020:0375","https://access.redhat.com/errata/RHSA-2020:0543","https://access.redhat.com/errata/RHSA-2020:0592","https://access.redhat.com/errata/RHSA-2020:0609","https://access.redhat.com/errata/RHSA-2020:0653","https://access.redhat.com/errata/RHSA-2020:0661","https://access.redhat.com/errata/RHSA-2020:0664","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4228-1/","https://usn.ubuntu.com/4228-2/","https://www.openwall.com/lists/oss-security/2019/11/22/2","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html","http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html","https://access.redhat.com/errata/RHSA-2020:0328","https://access.redhat.com/errata/RHSA-2020:0339","https://access.redhat.com/errata/RHSA-2020:0374","https://access.redhat.com/errata/RHSA-2020:0375","https://access.redhat.com/errata/RHSA-2020:0543","https://access.redhat.com/errata/RHSA-2020:0592","https://access.redhat.com/errata/RHSA-2020:0609","https://access.redhat.com/errata/RHSA-2020:0653","https://access.redhat.com/errata/RHSA-2020:0661","https://access.redhat.com/errata/RHSA-2020:0664","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4228-1/","https://usn.ubuntu.com/4228-2/","https://www.openwall.com/lists/oss-security/2019/11/22/2"],"published_time":"2019-11-29T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19318","summary":"In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00353,"ranking_epss":0.57734,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318","https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html","https://security.netapp.com/advisory/ntap-20200103-0001/","https://usn.ubuntu.com/4414-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318","https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html","https://security.netapp.com/advisory/ntap-20200103-0001/","https://usn.ubuntu.com/4414-1/"],"published_time":"2019-11-28T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19319","summary":"In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00436,"ranking_epss":0.62984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://bugzilla.suse.com/show_bug.cgi?id=1158021","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30","https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200103-0001/","https://usn.ubuntu.com/4391-1/","https://www.debian.org/security/2020/dsa-4698","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://bugzilla.suse.com/show_bug.cgi?id=1158021","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30","https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319","https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","https://security.netapp.com/advisory/ntap-20200103-0001/","https://usn.ubuntu.com/4391-1/","https://www.debian.org/security/2020/dsa-4698"],"published_time":"2019-11-27T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18660","summary":"The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.","cvss":4.7,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08157,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/11/27/1","https://access.redhat.com/errata/RHSA-2020:0174","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20200103-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4228-1/","https://usn.ubuntu.com/4228-2/","https://www.openwall.com/lists/oss-security/2019/11/27/1","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/11/27/1","https://access.redhat.com/errata/RHSA-2020:0174","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20200103-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4228-1/","https://usn.ubuntu.com/4228-2/","https://www.openwall.com/lists/oss-security/2019/11/27/1"],"published_time":"2019-11-27T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16255","summary":"Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the \"command\" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.","cvss":8.1,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01157,"ranking_epss":0.78594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html","https://hackerone.com/reports/327512","https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","https://seclists.org/bugtraq/2019/Dec/31","https://seclists.org/bugtraq/2019/Dec/32","https://security.gentoo.org/glsa/202003-06","https://www.debian.org/security/2019/dsa-4587","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/","https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/","https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/","https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html","https://hackerone.com/reports/327512","https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","https://seclists.org/bugtraq/2019/Dec/31","https://seclists.org/bugtraq/2019/Dec/32","https://security.gentoo.org/glsa/202003-06","https://www.debian.org/security/2019/dsa-4587","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/","https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/","https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/","https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/"],"published_time":"2019-11-26T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12523","summary":"An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.","cvss":9.1,"cvss_version":3.0,"cvss_v2":6.4,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00557,"ranking_epss":0.68234,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html","http://www.squid-cache.org/Advisories/SQUID-2019_8.txt","https://bugzilla.suse.com/show_bug.cgi?id=1156329","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/","https://usn.ubuntu.com/4213-1/","https://usn.ubuntu.com/4446-1/","https://www.debian.org/security/2020/dsa-4682","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html","http://www.squid-cache.org/Advisories/SQUID-2019_8.txt","https://bugzilla.suse.com/show_bug.cgi?id=1156329","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/","https://usn.ubuntu.com/4213-1/","https://usn.ubuntu.com/4446-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2019-11-26T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12526","summary":"An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.33643,"ranking_epss":0.96948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.squid-cache.org/Advisories/SQUID-2019_7.txt","https://bugzilla.suse.com/show_bug.cgi?id=1156326","https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/","https://security.gentoo.org/glsa/202003-34","https://usn.ubuntu.com/4213-1/","https://www.debian.org/security/2020/dsa-4682","http://www.squid-cache.org/Advisories/SQUID-2019_7.txt","https://bugzilla.suse.com/show_bug.cgi?id=1156326","https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/","https://security.gentoo.org/glsa/202003-34","https://usn.ubuntu.com/4213-1/","https://www.debian.org/security/2020/dsa-4682"],"published_time":"2019-11-26T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14856","summary":"ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00347,"ranking_epss":0.57308,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://access.redhat.com/errata/RHSA-2020:0756","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14856","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://access.redhat.com/errata/RHSA-2020:0756","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14856"],"published_time":"2019-11-26T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-13720","summary":"Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.89586,"ranking_epss":0.9956,"kev":true,"propose_action":"Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.","ransomware_campaign":"Unknown","references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html","http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html","https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1019226","https://security.gentoo.org/glsa/202004-04","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html","http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html","https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1019226","https://security.gentoo.org/glsa/202004-04","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-13720"],"published_time":"2019-11-25T15:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-10214","summary":"The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00473,"ranking_epss":0.64736,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214"],"published_time":"2019-11-25T11:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18622","summary":"An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72859,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/","https://security.gentoo.org/glsa/202003-39","https://www.phpmyadmin.net/security/PMASA-2019-5/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/","https://security.gentoo.org/glsa/202003-39","https://www.phpmyadmin.net/security/PMASA-2019-5/"],"published_time":"2019-11-22T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-10206","summary":"ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.","cvss":6.4,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00221,"ranking_epss":0.44745,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206","https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html","https://www.debian.org/security/2021/dsa-4950","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206","https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html","https://www.debian.org/security/2021/dsa-4950"],"published_time":"2019-11-22T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18934","summary":"Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.","cvss":7.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00671,"ranking_epss":0.71398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html","http://www.openwall.com/lists/oss-security/2019/11/19/1","https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCR6JP7MSRARTOGEHGST64G4FJGX5VK/","https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt","https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html","http://www.openwall.com/lists/oss-security/2019/11/19/1","https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCR6JP7MSRARTOGEHGST64G4FJGX5VK/","https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt","https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/"],"published_time":"2019-11-19T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19073","summary":"Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.","cvss":4.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24614,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4526-1/","https://usn.ubuntu.com/4527-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b","https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4526-1/","https://usn.ubuntu.com/4527-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-11-18T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19077","summary":"A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00117,"ranking_epss":0.30353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/"],"published_time":"2019-11-18T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19080","summary":"Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.","cvss":5.9,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01243,"ranking_epss":0.79286,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4","https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4","https://security.netapp.com/advisory/ntap-20191205-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4","https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4","https://security.netapp.com/advisory/ntap-20191205-0001/"],"published_time":"2019-11-18T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19081","summary":"A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.","cvss":5.9,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":5.9,"cvss_v4":null,"epss":0.0125,"ranking_epss":0.79348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4","https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e","https://security.netapp.com/advisory/ntap-20191205-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4","https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e","https://security.netapp.com/advisory/ntap-20191205-0001/"],"published_time":"2019-11-18T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19082","summary":"Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00096,"ranking_epss":0.26461,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/"],"published_time":"2019-11-18T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19083","summary":"Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07237,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8","https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8","https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/"],"published_time":"2019-11-18T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19056","summary":"A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19057","summary":"Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.","cvss":3.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.25263,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19058","summary":"A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25779,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19060","summary":"A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00839,"ranking_epss":0.74738,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9","https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4210-1/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4364-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9","https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4210-1/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4364-1/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19062","summary":"A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00098,"ranking_epss":0.26885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19063","summary":"Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.2235,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19065","summary":"A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12526,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9","https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4210-1/","https://usn.ubuntu.com/4226-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9","https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4210-1/","https://usn.ubuntu.com/4226-1/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19066","summary":"A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24368,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19067","summary":"Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24823,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://bugzilla.suse.com/show_bug.cgi?id=1157180","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8","https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4526-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://bugzilla.suse.com/show_bug.cgi?id=1157180","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8","https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4526-1/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19068","summary":"A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25854,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4300-1/","https://usn.ubuntu.com/4301-1/","https://usn.ubuntu.com/4302-1/"],"published_time":"2019-11-18T06:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19045","summary":"A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11","https://github.com/torvalds/linux/commit/c8c2a057fdc7de1cd16f4baa51425b932a42eb39","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11","https://github.com/torvalds/linux/commit/c8c2a057fdc7de1cd16f4baa51425b932a42eb39","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/"],"published_time":"2019-11-18T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19046","summary":"A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01256,"ranking_epss":0.79412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://bugzilla.suse.com/show_bug.cgi?id=1157304","https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://usn.ubuntu.com/4302-1/","https://usn.ubuntu.com/4319-1/","https://usn.ubuntu.com/4325-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://bugzilla.suse.com/show_bug.cgi?id=1157304","https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://usn.ubuntu.com/4302-1/","https://usn.ubuntu.com/4319-1/","https://usn.ubuntu.com/4325-1/"],"published_time":"2019-11-18T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19049","summary":"A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00682,"ranking_epss":0.71655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://bugzilla.suse.com/show_bug.cgi?id=1157173","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10","https://github.com/torvalds/linux/commit/e13de8fe0d6a51341671bbe384826d527afe8d44","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://bugzilla.suse.com/show_bug.cgi?id=1157173","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10","https://github.com/torvalds/linux/commit/e13de8fe0d6a51341671bbe384826d527afe8d44"],"published_time":"2019-11-18T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19051","summary":"A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11","https://github.com/torvalds/linux/commit/6f3ef5c25cc762687a7341c18cbea5af54461407","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4302-1/","https://usn.ubuntu.com/4344-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11","https://github.com/torvalds/linux/commit/6f3ef5c25cc762687a7341c18cbea5af54461407","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4302-1/","https://usn.ubuntu.com/4344-1/"],"published_time":"2019-11-18T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19052","summary":"A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01701,"ranking_epss":0.82332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11","https://github.com/torvalds/linux/commit/fb5be6a7b4863ecc44963bb80ca614584b6c7817","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4228-1/","https://usn.ubuntu.com/4228-2/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11","https://github.com/torvalds/linux/commit/fb5be6a7b4863ecc44963bb80ca614584b6c7817","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4228-1/","https://usn.ubuntu.com/4228-2/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-11-18T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-19054","summary":"A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/","https://usn.ubuntu.com/4527-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/","https://usn.ubuntu.com/4527-1/"],"published_time":"2019-11-18T06:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14869","summary":"A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.","cvss":7.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0027,"ranking_epss":0.50539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://jvn.jp/en/jp/JVN52486659/index.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html","http://www.openwall.com/lists/oss-security/2019/11/15/1","https://access.redhat.com/errata/RHSA-2020:0222","https://bugs.ghostscript.com/show_bug.cgi?id=701841","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/","https://seclists.org/bugtraq/2019/Nov/27","http://jvn.jp/en/jp/JVN52486659/index.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html","http://www.openwall.com/lists/oss-security/2019/11/15/1","https://access.redhat.com/errata/RHSA-2020:0222","https://bugs.ghostscript.com/show_bug.cgi?id=701841","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/","https://seclists.org/bugtraq/2019/Nov/27"],"published_time":"2019-11-15T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-12207","summary":"Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00262,"ranking_epss":0.49578,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html","https://access.redhat.com/errata/RHSA-2019:3916","https://access.redhat.com/errata/RHSA-2019:3936","https://access.redhat.com/errata/RHSA-2019:3941","https://access.redhat.com/errata/RHSA-2020:0026","https://access.redhat.com/errata/RHSA-2020:0028","https://access.redhat.com/errata/RHSA-2020:0204","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://support.f5.com/csp/article/K17269881?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4186-2/","https://www.debian.org/security/2020/dsa-4602","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html","https://access.redhat.com/errata/RHSA-2019:3916","https://access.redhat.com/errata/RHSA-2019:3936","https://access.redhat.com/errata/RHSA-2019:3941","https://access.redhat.com/errata/RHSA-2020:0026","https://access.redhat.com/errata/RHSA-2020:0028","https://access.redhat.com/errata/RHSA-2020:0204","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://support.f5.com/csp/article/K17269881?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4186-2/","https://www.debian.org/security/2020/dsa-4602","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2019-11-14T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11135","summary":"TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.","cvss":6.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00319,"ranking_epss":0.54969,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html","http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/12/10/3","http://www.openwall.com/lists/oss-security/2019/12/10/4","http://www.openwall.com/lists/oss-security/2019/12/11/1","https://access.redhat.com/errata/RHSA-2019:3936","https://access.redhat.com/errata/RHSA-2020:0026","https://access.redhat.com/errata/RHSA-2020:0028","https://access.redhat.com/errata/RHSA-2020:0204","https://access.redhat.com/errata/RHSA-2020:0279","https://access.redhat.com/errata/RHSA-2020:0366","https://access.redhat.com/errata/RHSA-2020:0555","https://access.redhat.com/errata/RHSA-2020:0666","https://access.redhat.com/errata/RHSA-2020:0730","https://kc.mcafee.com/corporate/index?page=content&id=SB10306","https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2019/Dec/28","https://seclists.org/bugtraq/2019/Nov/26","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS","https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us","https://usn.ubuntu.com/4186-2/","https://www.debian.org/security/2020/dsa-4602","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html","https://www.oracle.com/security-alerts/cpujan2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html","http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/12/10/3","http://www.openwall.com/lists/oss-security/2019/12/10/4","http://www.openwall.com/lists/oss-security/2019/12/11/1","https://access.redhat.com/errata/RHSA-2019:3936","https://access.redhat.com/errata/RHSA-2020:0026","https://access.redhat.com/errata/RHSA-2020:0028","https://access.redhat.com/errata/RHSA-2020:0204","https://access.redhat.com/errata/RHSA-2020:0279","https://access.redhat.com/errata/RHSA-2020:0366","https://access.redhat.com/errata/RHSA-2020:0555","https://access.redhat.com/errata/RHSA-2020:0666","https://access.redhat.com/errata/RHSA-2020:0730","https://kc.mcafee.com/corporate/index?page=content&id=SB10306","https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2019/Dec/28","https://seclists.org/bugtraq/2019/Nov/26","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS","https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us","https://usn.ubuntu.com/4186-2/","https://www.debian.org/security/2020/dsa-4602","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html","https://www.oracle.com/security-alerts/cpujan2021.html"],"published_time":"2019-11-14T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11139","summary":"Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.","cvss":6.0,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00121,"ranking_epss":0.31035,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html","https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html","https://seclists.org/bugtraq/2019/Dec/28","https://support.f5.com/csp/article/K42433061?utm_source=f5support&amp%3Butm_medium=RSS","https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html","https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html","https://seclists.org/bugtraq/2019/Dec/28","https://support.f5.com/csp/article/K42433061?utm_source=f5support&amp%3Butm_medium=RSS","https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"],"published_time":"2019-11-14T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18808","summary":"A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2021/09/14/1","https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://www.openwall.com/lists/oss-security/2021/09/14/1","https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4525-1/","https://usn.ubuntu.com/4526-1/"],"published_time":"2019-11-07T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18809","summary":"A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.26058,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/2289adbfa559050d2a38bcd9caac1c18b800e928","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","https://usn.ubuntu.com/4300-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","https://github.com/torvalds/linux/commit/2289adbfa559050d2a38bcd9caac1c18b800e928","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","https://usn.ubuntu.com/4300-1/"],"published_time":"2019-11-07T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18805","summary":"An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0057,"ranking_epss":0.68656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html","https://access.redhat.com/errata/RHSA-2020:0740","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78","https://security.netapp.com/advisory/ntap-20191205-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html","https://access.redhat.com/errata/RHSA-2020:0740","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78","https://security.netapp.com/advisory/ntap-20191205-0001/"],"published_time":"2019-11-07T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18804","summary":"DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04581,"ranking_epss":0.89233,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html","https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md","https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/","https://sourceforge.net/p/djvu/bugs/309/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html","https://github.com/TeamSeri0us/pocs/blob/master/djvulibre/DJVU__filter_fv%40IW44EncodeCodec.cpp_499-43___SEGV_UNKNOW.md","https://lists.debian.org/debian-lts-announce/2019/11/msg00004.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYPWP5T7TSUNZV4UEIRRCTVWO6VBZWJV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWT7E7BMWV5T33AMU6OGDPPTPIGCFFZF/","https://sourceforge.net/p/djvu/bugs/309/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032"],"published_time":"2019-11-07T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14833","summary":"A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.","cvss":4.2,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.2,"cvss_v4":null,"epss":0.01267,"ranking_epss":0.79491,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","https://www.samba.org/samba/security/CVE-2019-14833.html","https://www.synology.com/security/advisory/Synology_SA_19_35","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","https://www.samba.org/samba/security/CVE-2019-14833.html","https://www.synology.com/security/advisory/Synology_SA_19_35"],"published_time":"2019-11-06T10:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14847","summary":"A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.","cvss":4.9,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.9,"cvss_v4":null,"epss":0.02434,"ranking_epss":0.85183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","https://www.samba.org/samba/security/CVE-2019-14847.html","https://www.synology.com/security/advisory/Synology_SA_19_35","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847","https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","https://www.samba.org/samba/security/CVE-2019-14847.html","https://www.synology.com/security/advisory/Synology_SA_19_35"],"published_time":"2019-11-06T10:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5068","summary":"An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.","cvss":5.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html","https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc","https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html","https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857","https://usn.ubuntu.com/4271-1/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html","https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc","https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html","https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857","https://usn.ubuntu.com/4271-1/"],"published_time":"2019-11-05T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2016-4983","summary":"A postinstall script in the dovecot rpm allows local users to read the contents of newly created SSL/TLS key files.","cvss":3.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-updates/2016-11/msg00096.html","https://bugzilla.redhat.com/show_bug.cgi?id=1346055","https://bugzilla.suse.com/show_bug.cgi?id=984639","http://lists.opensuse.org/opensuse-updates/2016-11/msg00096.html","https://bugzilla.redhat.com/show_bug.cgi?id=1346055","https://bugzilla.suse.com/show_bug.cgi?id=984639"],"published_time":"2019-11-05T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2016-1000002","summary":"gdm3 3.14.2 and possibly later has an information leak before screen lock","cvss":2.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":2.4,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.36897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000002","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000002","https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000002.json","https://security-tracker.debian.org/tracker/CVE-2016-1000002","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000002","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000002","https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000002.json","https://security-tracker.debian.org/tracker/CVE-2016-1000002"],"published_time":"2019-11-05T14:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2015-8980","summary":"The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.04573,"ranking_epss":0.89224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html","http://seclists.org/fulldisclosure/2016/Aug/76","http://www.openwall.com/lists/oss-security/2017/01/18/4","http://www.securityfocus.com/bid/95754","https://bugzilla.redhat.com/show_bug.cgi?id=1367462","https://launchpad.net/php-gettext/trunk/1.0.12","https://lwn.net/Alerts/708838/","http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html","http://seclists.org/fulldisclosure/2016/Aug/76","http://www.openwall.com/lists/oss-security/2017/01/18/4","http://www.securityfocus.com/bid/95754","https://bugzilla.redhat.com/show_bug.cgi?id=1367462","https://launchpad.net/php-gettext/trunk/1.0.12","https://lwn.net/Alerts/708838/"],"published_time":"2019-11-04T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-5331","summary":"Integer overflow in the check_offset function in b/wrestool/fileread.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22835,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html","http://www.debian.org/security/2017/dsa-3765","http://www.openwall.com/lists/oss-security/2017/01/11/3","http://www.securityfocus.com/bid/95378","http://www.ubuntu.com/usn/USN-3178-1","https://bugzilla.redhat.com/show_bug.cgi?id=1412248","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html","http://www.debian.org/security/2017/dsa-3765","http://www.openwall.com/lists/oss-security/2017/01/11/3","http://www.securityfocus.com/bid/95378","http://www.ubuntu.com/usn/USN-3178-1","https://bugzilla.redhat.com/show_bug.cgi?id=1412248"],"published_time":"2019-11-04T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-5332","summary":"The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.46293,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html","http://rhn.redhat.com/errata/RHSA-2017-0837.html","http://www.debian.org/security/2017/dsa-3765","http://www.openwall.com/lists/oss-security/2017/01/11/3","http://www.securityfocus.com/bid/95380","http://www.ubuntu.com/usn/USN-3178-1","https://bugzilla.redhat.com/show_bug.cgi?id=1412263","https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html","http://rhn.redhat.com/errata/RHSA-2017-0837.html","http://www.debian.org/security/2017/dsa-3765","http://www.openwall.com/lists/oss-security/2017/01/11/3","http://www.securityfocus.com/bid/95380","http://www.ubuntu.com/usn/USN-3178-1","https://bugzilla.redhat.com/show_bug.cgi?id=1412263","https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a"],"published_time":"2019-11-04T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-5333","summary":"Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.46293,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html","http://rhn.redhat.com/errata/RHSA-2017-0837.html","http://www.debian.org/security/2017/dsa-3765","http://www.openwall.com/lists/oss-security/2017/01/11/3","http://www.securityfocus.com/bid/95678","http://www.ubuntu.com/usn/USN-3178-1","https://bugzilla.redhat.com/show_bug.cgi?id=1412259","https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html","http://rhn.redhat.com/errata/RHSA-2017-0837.html","http://www.debian.org/security/2017/dsa-3765","http://www.openwall.com/lists/oss-security/2017/01/11/3","http://www.securityfocus.com/bid/95678","http://www.ubuntu.com/usn/USN-3178-1","https://bugzilla.redhat.com/show_bug.cgi?id=1412259","https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a"],"published_time":"2019-11-04T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18683","summary":"An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00998,"ranking_epss":0.77008,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/11/05/1","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov%40linux.com/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","https://www.openwall.com/lists/oss-security/2019/11/02/1","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/11/05/1","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov%40linux.com/","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191205-0001/","https://usn.ubuntu.com/4254-1/","https://usn.ubuntu.com/4254-2/","https://usn.ubuntu.com/4258-1/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","https://www.openwall.com/lists/oss-security/2019/11/02/1"],"published_time":"2019-11-04T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-6470","summary":"There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.","cvss":6.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00265,"ranking_epss":0.50037,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2019:2060","https://access.redhat.com/errata/RHSA-2019:3525","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896122","https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html","https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html","https://access.redhat.com/errata/RHSA-2019:2060","https://access.redhat.com/errata/RHSA-2019:3525","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896122","https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html","https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html"],"published_time":"2019-11-01T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5010","summary":"An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.","cvss":5.9,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.9,"cvss_v4":null,"epss":0.05355,"ranking_epss":0.90095,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html","https://access.redhat.com/errata/RHSA-2019:3520","https://access.redhat.com/errata/RHSA-2019:3725","https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html","https://security.gentoo.org/glsa/202003-26","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html","https://access.redhat.com/errata/RHSA-2019:3520","https://access.redhat.com/errata/RHSA-2019:3725","https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html","https://security.gentoo.org/glsa/202003-26","https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758"],"published_time":"2019-10-31T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18424","summary":"An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.","cvss":6.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30748,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html","http://www.openwall.com/lists/oss-security/2019/10/31/6","http://xenbits.xen.org/xsa/advisory-302.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BQKX7M2RHCWDBKNPX4KEBI3MJIH6AYZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html","http://www.openwall.com/lists/oss-security/2019/10/31/6","http://xenbits.xen.org/xsa/advisory-302.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BQKX7M2RHCWDBKNPX4KEBI3MJIH6AYZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602"],"published_time":"2019-10-31T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18425","summary":"An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don't install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.","cvss":9.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":9.8,"cvss_v4":null,"epss":0.04874,"ranking_epss":0.89577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html","http://www.openwall.com/lists/oss-security/2019/10/31/2","http://xenbits.xen.org/xsa/advisory-298.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BQKX7M2RHCWDBKNPX4KEBI3MJIH6AYZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html","http://www.openwall.com/lists/oss-security/2019/10/31/2","http://xenbits.xen.org/xsa/advisory-298.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BQKX7M2RHCWDBKNPX4KEBI3MJIH6AYZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602"],"published_time":"2019-10-31T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18421","summary":"An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01863,"ranking_epss":0.83092,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html","http://www.openwall.com/lists/oss-security/2019/10/31/3","http://xenbits.xen.org/xsa/advisory-299.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BQKX7M2RHCWDBKNPX4KEBI3MJIH6AYZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html","http://www.openwall.com/lists/oss-security/2019/10/31/3","http://xenbits.xen.org/xsa/advisory-299.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BQKX7M2RHCWDBKNPX4KEBI3MJIH6AYZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/","https://seclists.org/bugtraq/2020/Jan/21","https://security.gentoo.org/glsa/202003-56","https://www.debian.org/security/2020/dsa-4602"],"published_time":"2019-10-31T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17596","summary":"Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0234,"ranking_epss":0.84883,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html","https://access.redhat.com/errata/RHSA-2020:0101","https://access.redhat.com/errata/RHSA-2020:0329","https://github.com/golang/go/issues/34960","https://groups.google.com/d/msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ","https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html","https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/","https://security.netapp.com/advisory/ntap-20191122-0005/","https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46","https://www.debian.org/security/2019/dsa-4551","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html","https://access.redhat.com/errata/RHSA-2020:0101","https://access.redhat.com/errata/RHSA-2020:0329","https://github.com/golang/go/issues/34960","https://groups.google.com/d/msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ","https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html","https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/","https://security.netapp.com/advisory/ntap-20191122-0005/","https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46","https://www.debian.org/security/2019/dsa-4551"],"published_time":"2019-10-24T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17498","summary":"In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01211,"ranking_epss":0.79019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html","http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html","https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/","https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498","https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480","https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c","https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/","https://security.netapp.com/advisory/ntap-20220909-0004/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html","http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html","https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/","https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498","https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480","https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c","https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/","https://security.netapp.com/advisory/ntap-20220909-0004/"],"published_time":"2019-10-21T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-18218","summary":"cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00174,"ranking_epss":0.38795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780","https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84","https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/","https://security.gentoo.org/glsa/202003-24","https://security.netapp.com/advisory/ntap-20200115-0001/","https://usn.ubuntu.com/4172-1/","https://usn.ubuntu.com/4172-2/","https://www.debian.org/security/2019/dsa-4550","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780","https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84","https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html","https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/","https://security.gentoo.org/glsa/202003-24","https://security.netapp.com/advisory/ntap-20200115-0001/","https://usn.ubuntu.com/4172-1/","https://usn.ubuntu.com/4172-2/","https://www.debian.org/security/2019/dsa-4550"],"published_time":"2019-10-21T05:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14287","summary":"In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a \"sudo -u \\#$((0xffffffff))\" command.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.85814,"ranking_epss":0.99385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html","http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html","http://www.openwall.com/lists/oss-security/2019/10/14/1","http://www.openwall.com/lists/oss-security/2019/10/24/1","http://www.openwall.com/lists/oss-security/2019/10/29/3","http://www.openwall.com/lists/oss-security/2021/09/14/2","https://access.redhat.com/errata/RHBA-2019:3248","https://access.redhat.com/errata/RHSA-2019:3197","https://access.redhat.com/errata/RHSA-2019:3204","https://access.redhat.com/errata/RHSA-2019:3205","https://access.redhat.com/errata/RHSA-2019:3209","https://access.redhat.com/errata/RHSA-2019:3219","https://access.redhat.com/errata/RHSA-2019:3278","https://access.redhat.com/errata/RHSA-2019:3694","https://access.redhat.com/errata/RHSA-2019:3754","https://access.redhat.com/errata/RHSA-2019:3755","https://access.redhat.com/errata/RHSA-2019:3895","https://access.redhat.com/errata/RHSA-2019:3916","https://access.redhat.com/errata/RHSA-2019:3941","https://access.redhat.com/errata/RHSA-2019:4191","https://access.redhat.com/errata/RHSA-2020:0388","https://lists.debian.org/debian-lts-announce/2019/10/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IP7SIOAVLSKJGMTIULX52VQUPTVSC43U/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPLAM57TPJQGKQMNG6RHFBLACD6K356N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUVAOZBYUHZS56A5FQSCDVGXT7PW7FL2/","https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287","https://seclists.org/bugtraq/2019/Oct/20","https://seclists.org/bugtraq/2019/Oct/21","https://security.gentoo.org/glsa/202003-12","https://security.netapp.com/advisory/ntap-20191017-0003/","https://support.f5.com/csp/article/K53746212?utm_source=f5support&amp%3Butm_medium=RSS","https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us","https://usn.ubuntu.com/4154-1/","https://www.debian.org/security/2019/dsa-4543","https://www.openwall.com/lists/oss-security/2019/10/15/2","https://www.sudo.ws/alerts/minus_1_uid.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html","http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html","http://www.openwall.com/lists/oss-security/2019/10/14/1","http://www.openwall.com/lists/oss-security/2019/10/24/1","http://www.openwall.com/lists/oss-security/2019/10/29/3","http://www.openwall.com/lists/oss-security/2021/09/14/2","https://access.redhat.com/errata/RHBA-2019:3248","https://access.redhat.com/errata/RHSA-2019:3197","https://access.redhat.com/errata/RHSA-2019:3204","https://access.redhat.com/errata/RHSA-2019:3205","https://access.redhat.com/errata/RHSA-2019:3209","https://access.redhat.com/errata/RHSA-2019:3219","https://access.redhat.com/errata/RHSA-2019:3278","https://access.redhat.com/errata/RHSA-2019:3694","https://access.redhat.com/errata/RHSA-2019:3754","https://access.redhat.com/errata/RHSA-2019:3755","https://access.redhat.com/errata/RHSA-2019:3895","https://access.redhat.com/errata/RHSA-2019:3916","https://access.redhat.com/errata/RHSA-2019:3941","https://access.redhat.com/errata/RHSA-2019:4191","https://access.redhat.com/errata/RHSA-2020:0388","https://lists.debian.org/debian-lts-announce/2019/10/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IP7SIOAVLSKJGMTIULX52VQUPTVSC43U/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPLAM57TPJQGKQMNG6RHFBLACD6K356N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUVAOZBYUHZS56A5FQSCDVGXT7PW7FL2/","https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287","https://seclists.org/bugtraq/2019/Oct/20","https://seclists.org/bugtraq/2019/Oct/21","https://security.gentoo.org/glsa/202003-12","https://security.netapp.com/advisory/ntap-20191017-0003/","https://support.f5.com/csp/article/K53746212?utm_source=f5support&amp%3Butm_medium=RSS","https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us","https://usn.ubuntu.com/4154-1/","https://www.debian.org/security/2019/dsa-4543","https://www.openwall.com/lists/oss-security/2019/10/15/2","https://www.sudo.ws/alerts/minus_1_uid.html"],"published_time":"2019-10-17T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2992","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00898,"ranking_epss":0.75684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2999","summary":"Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.7,"cvss_v4":null,"epss":0.01308,"ranking_epss":0.79813,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2974","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20191017-0002/","https://usn.ubuntu.com/4195-1/","https://usn.ubuntu.com/4195-2/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20191017-0002/","https://usn.ubuntu.com/4195-1/","https://usn.ubuntu.com/4195-2/"],"published_time":"2019-10-16T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2975","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00488,"ranking_epss":0.65509,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2978","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00476,"ranking_epss":0.64918,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2981","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00333,"ranking_epss":0.56195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2983","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00344,"ranking_epss":0.57063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2988","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00514,"ranking_epss":0.66609,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2962","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00476,"ranking_epss":0.64905,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2964","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00476,"ranking_epss":0.64905,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2973","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00576,"ranking_epss":0.68825,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2949","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).","cvss":6.8,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00551,"ranking_epss":0.68024,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://support.f5.com/csp/article/K54213762?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://support.f5.com/csp/article/K54213762?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2958","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01183,"ranking_epss":0.78796,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://security.netapp.com/advisory/ntap-20191017-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://security.netapp.com/advisory/ntap-20191017-0001/"],"published_time":"2019-10-16T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2933","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).","cvss":3.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00507,"ranking_epss":0.66324,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://security.netapp.com/advisory/ntap-20191017-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://security.netapp.com/advisory/ntap-20191017-0001/"],"published_time":"2019-10-16T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2938","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":3.5,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20191017-0002/","https://usn.ubuntu.com/4195-1/","https://usn.ubuntu.com/4195-2/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/","https://security.gentoo.org/glsa/202105-27","https://security.netapp.com/advisory/ntap-20191017-0002/","https://usn.ubuntu.com/4195-1/","https://usn.ubuntu.com/4195-2/"],"published_time":"2019-10-16T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2945","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).","cvss":3.1,"cvss_version":3.0,"cvss_v2":2.6,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00296,"ranking_epss":0.5292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://access.redhat.com/errata/RHSA-2019:3134","https://access.redhat.com/errata/RHSA-2019:3135","https://access.redhat.com/errata/RHSA-2019:3136","https://access.redhat.com/errata/RHSA-2019:3157","https://access.redhat.com/errata/RHSA-2019:3158","https://access.redhat.com/errata/RHSA-2019:4109","https://access.redhat.com/errata/RHSA-2019:4110","https://access.redhat.com/errata/RHSA-2019:4113","https://access.redhat.com/errata/RHSA-2019:4115","https://access.redhat.com/errata/RHSA-2020:0006","https://access.redhat.com/errata/RHSA-2020:0046","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2894","summary":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).","cvss":3.7,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.7,"cvss_v4":null,"epss":0.0058,"ranking_epss":0.68935,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.openwall.com/lists/oss-security/2019/10/02/2","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://minerva.crocs.fi.muni.cz/","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","http://www.openwall.com/lists/oss-security/2019/10/02/2","http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10315","https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","https://minerva.crocs.fi.muni.cz/","https://seclists.org/bugtraq/2019/Oct/27","https://seclists.org/bugtraq/2019/Oct/31","https://security.netapp.com/advisory/ntap-20191017-0001/","https://usn.ubuntu.com/4223-1/","https://www.debian.org/security/2019/dsa-4546","https://www.debian.org/security/2019/dsa-4548"],"published_time":"2019-10-16T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17594","summary":"There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html","https://security.gentoo.org/glsa/202101-28","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html","https://security.gentoo.org/glsa/202101-28"],"published_time":"2019-10-14T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17595","summary":"There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.","cvss":5.4,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html","https://security.gentoo.org/glsa/202101-28","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html","https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html","https://security.gentoo.org/glsa/202101-28"],"published_time":"2019-10-14T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17545","summary":"GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02245,"ranking_epss":0.84593,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00022.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178","https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb","https://lists.debian.org/debian-lts-announce/2019/11/msg00005.html","https://lists.debian.org/debian-lts-announce/2022/01/msg00004.html","https://lists.debian.org/debian-lts-announce/2022/09/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVRC3EBQBFBVQC26XJE3AI3KQXC2NGTP/","https://www.oracle.com//security-alerts/cpujul2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00022.html","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178","https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb","https://lists.debian.org/debian-lts-announce/2019/11/msg00005.html","https://lists.debian.org/debian-lts-announce/2022/01/msg00004.html","https://lists.debian.org/debian-lts-announce/2022/09/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVRC3EBQBFBVQC26XJE3AI3KQXC2NGTP/","https://www.oracle.com//security-alerts/cpujul2021.html"],"published_time":"2019-10-14T02:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17455","summary":"Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.07078,"ranking_epss":0.91535,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00032.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942145","https://gitlab.com/jas/libntlm/issues/2","https://lists.debian.org/debian-lts-announce/2020/05/msg00010.html","https://lists.debian.org/debian-lts-announce/2021/11/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BVFO3OVJPMSGIXBKNOCVOJZ3UTGZQF5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5YWYNOJ5HMCKAHWLTY4MXZQWJJCBI7/","https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17455.html","https://security-tracker.debian.org/tracker/CVE-2019-17455","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00029.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00032.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942145","https://gitlab.com/jas/libntlm/issues/2","https://lists.debian.org/debian-lts-announce/2020/05/msg00010.html","https://lists.debian.org/debian-lts-announce/2021/11/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BVFO3OVJPMSGIXBKNOCVOJZ3UTGZQF5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5YWYNOJ5HMCKAHWLTY4MXZQWJJCBI7/","https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17455.html","https://security-tracker.debian.org/tracker/CVE-2019-17455"],"published_time":"2019-10-10T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17450","summary":"find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01079,"ranking_epss":0.77865,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html","https://security.gentoo.org/glsa/202007-39","https://security.netapp.com/advisory/ntap-20191024-0002/","https://sourceware.org/bugzilla/show_bug.cgi?id=25078","https://usn.ubuntu.com/4336-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html","https://security.gentoo.org/glsa/202007-39","https://security.netapp.com/advisory/ntap-20191024-0002/","https://sourceware.org/bugzilla/show_bug.cgi?id=25078","https://usn.ubuntu.com/4336-1/"],"published_time":"2019-10-10T17:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17451","summary":"An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00741,"ranking_epss":0.72998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html","https://security.gentoo.org/glsa/202007-39","https://security.netapp.com/advisory/ntap-20191024-0002/","https://sourceware.org/bugzilla/show_bug.cgi?id=25070","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1","https://usn.ubuntu.com/4336-1/","http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html","https://security.gentoo.org/glsa/202007-39","https://security.netapp.com/advisory/ntap-20191024-0002/","https://sourceware.org/bugzilla/show_bug.cgi?id=25070","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1","https://usn.ubuntu.com/4336-1/"],"published_time":"2019-10-10T17:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14846","summary":"In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.","cvss":7.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.31957,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://access.redhat.com/errata/RHSA-2019:3201","https://access.redhat.com/errata/RHSA-2019:3202","https://access.redhat.com/errata/RHSA-2019:3203","https://access.redhat.com/errata/RHSA-2019:3207","https://access.redhat.com/errata/RHSA-2020:0756","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846","https://github.com/ansible/ansible/pull/63366","https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html","https://www.debian.org/security/2021/dsa-4950","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","https://access.redhat.com/errata/RHSA-2019:3201","https://access.redhat.com/errata/RHSA-2019:3202","https://access.redhat.com/errata/RHSA-2019:3203","https://access.redhat.com/errata/RHSA-2019:3207","https://access.redhat.com/errata/RHSA-2020:0756","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846","https://github.com/ansible/ansible/pull/63366","https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html","https://www.debian.org/security/2021/dsa-4950"],"published_time":"2019-10-08T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17041","summary":"An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01796,"ranking_epss":0.82806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html","https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog","https://github.com/rsyslog/rsyslog/pull/3884","https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html","https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog","https://github.com/rsyslog/rsyslog/pull/3884","https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/"],"published_time":"2019-10-07T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17042","summary":"An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00487,"ranking_epss":0.65497,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html","https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog","https://github.com/rsyslog/rsyslog/pull/3883","https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html","https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog","https://github.com/rsyslog/rsyslog/pull/3883","https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/"],"published_time":"2019-10-07T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17177","summary":"libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00872,"ranking_epss":0.75284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html","https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a","https://github.com/FreeRDP/FreeRDP/issues/5645","https://security.gentoo.org/glsa/202005-07","https://usn.ubuntu.com/4379-1/","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html","https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a","https://github.com/FreeRDP/FreeRDP/issues/5645","https://security.gentoo.org/glsa/202005-07","https://usn.ubuntu.com/4379-1/"],"published_time":"2019-10-04T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17178","summary":"HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00827,"ranking_epss":0.74534,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html","https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a","https://github.com/FreeRDP/FreeRDP/issues/5645","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html","https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a","https://github.com/FreeRDP/FreeRDP/issues/5645"],"published_time":"2019-10-04T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17133","summary":"In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0156,"ranking_epss":0.81515,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://access.redhat.com/errata/RHSA-2020:0174","https://access.redhat.com/errata/RHSA-2020:0374","https://access.redhat.com/errata/RHSA-2020:0375","https://access.redhat.com/errata/RHSA-2020:0543","https://access.redhat.com/errata/RHSA-2020:0592","https://access.redhat.com/errata/RHSA-2020:0609","https://access.redhat.com/errata/RHSA-2020:0653","https://access.redhat.com/errata/RHSA-2020:0661","https://access.redhat.com/errata/RHSA-2020:0664","https://access.redhat.com/errata/RHSA-2020:0790","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://marc.info/?l=linux-wireless&m=157018270915487&w=2","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4210-1/","https://usn.ubuntu.com/4211-1/","https://usn.ubuntu.com/4211-2/","https://usn.ubuntu.com/4226-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://access.redhat.com/errata/RHSA-2020:0174","https://access.redhat.com/errata/RHSA-2020:0374","https://access.redhat.com/errata/RHSA-2020:0375","https://access.redhat.com/errata/RHSA-2020:0543","https://access.redhat.com/errata/RHSA-2020:0592","https://access.redhat.com/errata/RHSA-2020:0609","https://access.redhat.com/errata/RHSA-2020:0653","https://access.redhat.com/errata/RHSA-2020:0661","https://access.redhat.com/errata/RHSA-2020:0664","https://access.redhat.com/errata/RHSA-2020:0790","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://marc.info/?l=linux-wireless&m=157018270915487&w=2","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4208-1/","https://usn.ubuntu.com/4210-1/","https://usn.ubuntu.com/4211-1/","https://usn.ubuntu.com/4211-2/","https://usn.ubuntu.com/4226-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-10-04T12:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15165","summary":"sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.01031,"ranking_epss":0.7737,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES","https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab","https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6","https://lists.debian.org/debian-lts-announce/2019/10/msg00031.html","https://lists.debian.org/debian-lts-announce/2021/12/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/","https://seclists.org/bugtraq/2019/Dec/23","https://support.apple.com/kb/HT210785","https://support.apple.com/kb/HT210788","https://support.apple.com/kb/HT210789","https://support.apple.com/kb/HT210790","https://usn.ubuntu.com/4221-1/","https://usn.ubuntu.com/4221-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.tcpdump.org/public-cve-list.txt","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES","https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab","https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6","https://lists.debian.org/debian-lts-announce/2019/10/msg00031.html","https://lists.debian.org/debian-lts-announce/2021/12/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/","https://seclists.org/bugtraq/2019/Dec/23","https://support.apple.com/kb/HT210785","https://support.apple.com/kb/HT210788","https://support.apple.com/kb/HT210789","https://support.apple.com/kb/HT210790","https://usn.ubuntu.com/4221-1/","https://usn.ubuntu.com/4221-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.tcpdump.org/public-cve-list.txt"],"published_time":"2019-10-03T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15166","summary":"lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.","cvss":1.6,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":1.6,"cvss_v4":null,"epss":0.01018,"ranking_epss":0.7725,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14470","summary":"The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02005,"ranking_epss":0.83716,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14879","summary":"The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().","cvss":7.0,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0052,"ranking_epss":0.66858,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://support.f5.com/csp/article/K51512510?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://support.f5.com/csp/article/K51512510?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14880","summary":"The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00986,"ranking_epss":0.76876,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://support.f5.com/csp/article/K56551263?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://support.f5.com/csp/article/K56551263?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14881","summary":"The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01518,"ranking_epss":0.81276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14882","summary":"The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02378,"ranking_epss":0.85008,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-16227","summary":"The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03505,"ranking_epss":0.87634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-16228","summary":"The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02169,"ranking_epss":0.84339,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-16229","summary":"The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0297,"ranking_epss":0.86524,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-16230","summary":"The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00474,"ranking_epss":0.64821,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-16451","summary":"The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \\MAILSLOT\\BROWSE and \\PIPE\\LANMAN.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00474,"ranking_epss":0.64821,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14461","summary":"The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00335,"ranking_epss":0.56398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14462","summary":"The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00519,"ranking_epss":0.6685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14463","summary":"The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00618,"ranking_epss":0.70013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14464","summary":"The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02005,"ranking_epss":0.83716,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14465","summary":"The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01758,"ranking_epss":0.8263,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14466","summary":"The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00455,"ranking_epss":0.63877,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14467","summary":"The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00455,"ranking_epss":0.63877,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14468","summary":"The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00678,"ranking_epss":0.71579,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://support.f5.com/csp/article/K04367730?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://support.f5.com/csp/article/K04367730?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14469","summary":"The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00986,"ranking_epss":0.76876,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html","http://seclists.org/fulldisclosure/2019/Dec/26","https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES","https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c","https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/","https://seclists.org/bugtraq/2019/Dec/23","https://seclists.org/bugtraq/2019/Oct/28","https://security.netapp.com/advisory/ntap-20200120-0001/","https://support.apple.com/kb/HT210788","https://usn.ubuntu.com/4252-1/","https://usn.ubuntu.com/4252-2/","https://www.debian.org/security/2019/dsa-4547"],"published_time":"2019-10-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17068","summary":"PuTTY before 0.73 mishandles the \"bracketed paste mode\" protection mechanism, which may allow a session to be affected by malicious clipboard content.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00467,"ranking_epss":0.64454,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html","https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html","https://security.netapp.com/advisory/ntap-20191127-0003/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html","https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html","https://security.netapp.com/advisory/ntap-20191127-0003/"],"published_time":"2019-10-01T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17069","summary":"PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00474,"ranking_epss":0.64816,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html","https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html","https://security.netapp.com/advisory/ntap-20191127-0003/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html","https://lists.tartarus.org/pipermail/putty-announce/2019/000029.html","https://security.netapp.com/advisory/ntap-20191127-0003/"],"published_time":"2019-10-01T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-17055","summary":"base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.","cvss":3.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25105,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://access.redhat.com/errata/RHSA-2020:0790","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/","https://seclists.org/bugtraq/2019/Nov/11","https://usn.ubuntu.com/4184-1/","https://usn.ubuntu.com/4185-1/","https://usn.ubuntu.com/4185-2/","https://usn.ubuntu.com/4186-1/","https://usn.ubuntu.com/4186-2/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://access.redhat.com/errata/RHSA-2020:0790","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/","https://seclists.org/bugtraq/2019/Nov/11","https://usn.ubuntu.com/4184-1/","https://usn.ubuntu.com/4185-1/","https://usn.ubuntu.com/4185-2/","https://usn.ubuntu.com/4186-1/","https://usn.ubuntu.com/4186-2/"],"published_time":"2019-10-01T14:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16276","summary":"Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09843,"ranking_epss":0.92992,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html","https://access.redhat.com/errata/RHSA-2020:0101","https://access.redhat.com/errata/RHSA-2020:0329","https://access.redhat.com/errata/RHSA-2020:0652","https://github.com/golang/go/issues/34540","https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ","https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html","https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/","https://security.netapp.com/advisory/ntap-20191122-0004/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html","https://access.redhat.com/errata/RHSA-2020:0101","https://access.redhat.com/errata/RHSA-2020:0329","https://access.redhat.com/errata/RHSA-2020:0652","https://github.com/golang/go/issues/34540","https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ","https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html","https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/","https://security.netapp.com/advisory/ntap-20191122-0004/"],"published_time":"2019-09-30T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16994","summary":"In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn->fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22803,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d","https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d","https://security.netapp.com/advisory/ntap-20191031-0005/","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d","https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d","https://security.netapp.com/advisory/ntap-20191031-0005/"],"published_time":"2019-09-30T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16995","summary":"In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01997,"ranking_epss":0.83672,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626","https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626","https://security.netapp.com/advisory/ntap-20191031-0005/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626","https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626","https://security.netapp.com/advisory/ntap-20191031-0005/"],"published_time":"2019-09-30T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9433","summary":"In libvpx, there is a possible information disclosure due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-80479354","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.08604,"ranking_epss":0.92436,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.debian.org/debian-lts-announce/2019/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://usn.ubuntu.com/4199-2/","https://www.debian.org/security/2019/dsa-4578","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.debian.org/debian-lts-announce/2019/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://usn.ubuntu.com/4199-2/","https://www.debian.org/security/2019/dsa-4578"],"published_time":"2019-09-27T19:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9371","summary":"In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132783254","cvss":6.5,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.17758,"ranking_epss":0.95134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://www.debian.org/security/2019/dsa-4578","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://www.debian.org/security/2019/dsa-4578"],"published_time":"2019-09-27T19:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9325","summary":"In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112001302","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0889,"ranking_epss":0.92576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://www.debian.org/security/2019/dsa-4578","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://www.debian.org/security/2019/dsa-4578"],"published_time":"2019-09-27T19:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9278","summary":"In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03749,"ranking_epss":0.88039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://github.com/libexif/libexif/commit/75aa73267fdb1e0ebfbc00369e7312bac43d0566","https://github.com/libexif/libexif/issues/26","https://lists.debian.org/debian-lts-announce/2020/02/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO2VTHD7OLPJDCJBHKUQTBAHZOBBCF6X/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VA5BPQLOFXIZOOJHBYDU635Z5KLUMTDD/","https://seclists.org/bugtraq/2020/Feb/9","https://security.gentoo.org/glsa/202007-05","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4277-1/","https://www.debian.org/security/2020/dsa-4618","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://github.com/libexif/libexif/commit/75aa73267fdb1e0ebfbc00369e7312bac43d0566","https://github.com/libexif/libexif/issues/26","https://lists.debian.org/debian-lts-announce/2020/02/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO2VTHD7OLPJDCJBHKUQTBAHZOBBCF6X/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VA5BPQLOFXIZOOJHBYDU635Z5KLUMTDD/","https://seclists.org/bugtraq/2020/Feb/9","https://security.gentoo.org/glsa/202007-05","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4277-1/","https://www.debian.org/security/2020/dsa-4618"],"published_time":"2019-09-27T19:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9232","summary":"In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122675483","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09266,"ranking_epss":0.92742,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.debian.org/debian-lts-announce/2019/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://usn.ubuntu.com/4199-2/","https://www.debian.org/security/2019/dsa-4578","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","http://www.openwall.com/lists/oss-security/2019/10/25/17","http://www.openwall.com/lists/oss-security/2019/10/27/1","http://www.openwall.com/lists/oss-security/2019/11/07/1","https://lists.debian.org/debian-lts-announce/2019/11/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://seclists.org/bugtraq/2019/Nov/43","https://security.gentoo.org/glsa/202003-59","https://source.android.com/security/bulletin/android-10","https://usn.ubuntu.com/4199-1/","https://usn.ubuntu.com/4199-2/","https://www.debian.org/security/2019/dsa-4578"],"published_time":"2019-09-27T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11735","summary":"Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00458,"ranking_epss":0.64028,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358","https://www.mozilla.org/security/advisories/mfsa2019-25/","https://www.mozilla.org/security/advisories/mfsa2019-26/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358","https://www.mozilla.org/security/advisories/mfsa2019-25/","https://www.mozilla.org/security/advisories/mfsa2019-26/"],"published_time":"2019-09-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11738","summary":"If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.","cvss":6.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00585,"ranking_epss":0.69089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1452037","https://www.mozilla.org/security/advisories/mfsa2019-25/","https://www.mozilla.org/security/advisories/mfsa2019-26/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html","https://bugzilla.mozilla.org/show_bug.cgi?id=1452037","https://www.mozilla.org/security/advisories/mfsa2019-25/","https://www.mozilla.org/security/advisories/mfsa2019-26/"],"published_time":"2019-09-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11740","summary":"Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.015,"ranking_epss":0.81172,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160","https://security.gentoo.org/glsa/201911-07","https://usn.ubuntu.com/4150-1/","https://www.mozilla.org/security/advisories/mfsa2019-25/","https://www.mozilla.org/security/advisories/mfsa2019-26/","https://www.mozilla.org/security/advisories/mfsa2019-27/","https://www.mozilla.org/security/advisories/mfsa2019-29/","https://www.mozilla.org/security/advisories/mfsa2019-30/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html","https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160","https://security.gentoo.org/glsa/201911-07","https://usn.ubuntu.com/4150-1/","https://www.mozilla.org/security/advisories/mfsa2019-25/","https://www.mozilla.org/security/advisories/mfsa2019-26/","https://www.mozilla.org/security/advisories/mfsa2019-27/","https://www.mozilla.org/security/advisories/mfsa2019-29/","https://www.mozilla.org/security/advisories/mfsa2019-30/"],"published_time":"2019-09-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-10092","summary":"In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.","cvss":6.1,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.1,"cvss_v4":null,"epss":0.82379,"ranking_epss":0.99228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html","http://www.openwall.com/lists/oss-security/2019/08/15/4","http://www.openwall.com/lists/oss-security/2020/08/08/1","http://www.openwall.com/lists/oss-security/2020/08/08/9","https://access.redhat.com/errata/RHSA-2019:4126","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E","https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/","https://seclists.org/bugtraq/2019/Aug/47","https://seclists.org/bugtraq/2019/Oct/24","https://security.gentoo.org/glsa/201909-04","https://security.netapp.com/advisory/ntap-20190905-0003/","https://support.f5.com/csp/article/K30442259","https://usn.ubuntu.com/4113-1/","https://www.debian.org/security/2019/dsa-4509","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html","http://www.openwall.com/lists/oss-security/2019/08/15/4","http://www.openwall.com/lists/oss-security/2020/08/08/1","http://www.openwall.com/lists/oss-security/2020/08/08/9","https://access.redhat.com/errata/RHSA-2019:4126","https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E","https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/","https://seclists.org/bugtraq/2019/Aug/47","https://seclists.org/bugtraq/2019/Oct/24","https://security.gentoo.org/glsa/201909-04","https://security.netapp.com/advisory/ntap-20190905-0003/","https://support.f5.com/csp/article/K30442259","https://usn.ubuntu.com/4113-1/","https://www.debian.org/security/2019/dsa-4509","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"],"published_time":"2019-09-26T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16884","summary":"runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00348,"ranking_epss":0.57369,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html","https://access.redhat.com/errata/RHSA-2019:3940","https://access.redhat.com/errata/RHSA-2019:4074","https://access.redhat.com/errata/RHSA-2019:4269","https://github.com/opencontainers/runc/issues/2128","https://lists.debian.org/debian-lts-announce/2023/02/msg00016.html","https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/","https://security.gentoo.org/glsa/202003-21","https://security.netapp.com/advisory/ntap-20220221-0004/","https://usn.ubuntu.com/4297-1/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html","https://access.redhat.com/errata/RHSA-2019:3940","https://access.redhat.com/errata/RHSA-2019:4074","https://access.redhat.com/errata/RHSA-2019:4269","https://github.com/opencontainers/runc/issues/2128","https://lists.debian.org/debian-lts-announce/2023/02/msg00016.html","https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/","https://security.gentoo.org/glsa/202003-21","https://security.netapp.com/advisory/ntap-20220221-0004/","https://usn.ubuntu.com/4297-1/"],"published_time":"2019-09-25T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-13627","summary":"It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.","cvss":6.3,"cvss_version":3.0,"cvss_v2":2.6,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11639,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html","http://www.openwall.com/lists/oss-security/2019/10/02/2","https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5","https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html","https://minerva.crocs.fi.muni.cz/","https://security-tracker.debian.org/tracker/CVE-2019-13627","https://security.gentoo.org/glsa/202003-32","https://usn.ubuntu.com/4236-1/","https://usn.ubuntu.com/4236-2/","https://usn.ubuntu.com/4236-3/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html","http://www.openwall.com/lists/oss-security/2019/10/02/2","https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5","https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html","https://minerva.crocs.fi.muni.cz/","https://security-tracker.debian.org/tracker/CVE-2019-13627","https://security.gentoo.org/glsa/202003-32","https://usn.ubuntu.com/4236-1/","https://usn.ubuntu.com/4236-2/","https://usn.ubuntu.com/4236-3/"],"published_time":"2019-09-25T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12068","summary":"In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.","cvss":3.8,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24742,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html","https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08","https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html","https://security-tracker.debian.org/tracker/CVE-2019-12068","https://usn.ubuntu.com/4191-1/","https://usn.ubuntu.com/4191-2/","https://www.debian.org/security/2020/dsa-4665","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html","https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08","https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html","https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html","https://security-tracker.debian.org/tracker/CVE-2019-12068","https://usn.ubuntu.com/4191-1/","https://usn.ubuntu.com/4191-2/","https://www.debian.org/security/2020/dsa-4665"],"published_time":"2019-09-24T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16746","summary":"An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02601,"ranking_epss":0.85641,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TASE2ESEZAER6DTZH3DJ4K2JNO46TVL7/","https://marc.info/?l=linux-wireless&m=156901391225058&w=2","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4183-1/","https://usn.ubuntu.com/4186-1/","https://usn.ubuntu.com/4209-1/","https://usn.ubuntu.com/4210-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TASE2ESEZAER6DTZH3DJ4K2JNO46TVL7/","https://marc.info/?l=linux-wireless&m=156901391225058&w=2","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4183-1/","https://usn.ubuntu.com/4186-1/","https://usn.ubuntu.com/4209-1/","https://usn.ubuntu.com/4210-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-09-24T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16708","summary":"ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00194,"ranking_epss":0.41379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1531","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1531","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712"],"published_time":"2019-09-23T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16709","summary":"ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00188,"ranking_epss":0.40637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1531","https://usn.ubuntu.com/4192-1/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1531","https://usn.ubuntu.com/4192-1/"],"published_time":"2019-09-23T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16710","summary":"ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00194,"ranking_epss":0.41379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1528","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1528","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712"],"published_time":"2019-09-23T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16711","summary":"ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00194,"ranking_epss":0.41379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1542","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1542","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712"],"published_time":"2019-09-23T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16712","summary":"ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.25957,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1557","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1557"],"published_time":"2019-09-23T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16713","summary":"ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00194,"ranking_epss":0.41379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1558","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1558","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712"],"published_time":"2019-09-23T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14814","summary":"There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.","cvss":5.5,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00183,"ranking_epss":0.40095,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/08/28/1","https://access.redhat.com/errata/RHSA-2020:0174","https://access.redhat.com/errata/RHSA-2020:0328","https://access.redhat.com/errata/RHSA-2020:0339","https://access.redhat.com/security/cve/cve-2019-14814","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814","https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.openwall.com/lists/oss-security/2019/08/28/1","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/08/28/1","https://access.redhat.com/errata/RHSA-2020:0174","https://access.redhat.com/errata/RHSA-2020:0328","https://access.redhat.com/errata/RHSA-2020:0339","https://access.redhat.com/security/cve/cve-2019-14814","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814","https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.openwall.com/lists/oss-security/2019/08/28/1"],"published_time":"2019-09-20T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14816","summary":"There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.","cvss":5.5,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/08/28/1","https://access.redhat.com/errata/RHSA-2020:0174","https://access.redhat.com/errata/RHSA-2020:0204","https://access.redhat.com/errata/RHSA-2020:0328","https://access.redhat.com/errata/RHSA-2020:0339","https://access.redhat.com/errata/RHSA-2020:0374","https://access.redhat.com/errata/RHSA-2020:0375","https://access.redhat.com/errata/RHSA-2020:0653","https://access.redhat.com/errata/RHSA-2020:0661","https://access.redhat.com/errata/RHSA-2020:0664","https://access.redhat.com/security/cve/cve-2019-14816","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816","https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.openwall.com/lists/oss-security/2019/08/28/1","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/08/28/1","https://access.redhat.com/errata/RHSA-2020:0174","https://access.redhat.com/errata/RHSA-2020:0204","https://access.redhat.com/errata/RHSA-2020:0328","https://access.redhat.com/errata/RHSA-2020:0339","https://access.redhat.com/errata/RHSA-2020:0374","https://access.redhat.com/errata/RHSA-2020:0375","https://access.redhat.com/errata/RHSA-2020:0653","https://access.redhat.com/errata/RHSA-2020:0661","https://access.redhat.com/errata/RHSA-2020:0664","https://access.redhat.com/security/cve/cve-2019-14816","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816","https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.openwall.com/lists/oss-security/2019/08/28/1"],"published_time":"2019-09-20T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14821","summary":"An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28775,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/09/20/1","https://access.redhat.com/errata/RHSA-2019:3309","https://access.redhat.com/errata/RHSA-2019:3517","https://access.redhat.com/errata/RHSA-2019:3978","https://access.redhat.com/errata/RHSA-2019:3979","https://access.redhat.com/errata/RHSA-2019:4154","https://access.redhat.com/errata/RHSA-2019:4256","https://access.redhat.com/errata/RHSA-2020:0027","https://access.redhat.com/errata/RHSA-2020:0204","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/","https://seclists.org/bugtraq/2019/Nov/11","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.debian.org/security/2019/dsa-4531","https://www.oracle.com/security-alerts/cpuapr2020.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/09/20/1","https://access.redhat.com/errata/RHSA-2019:3309","https://access.redhat.com/errata/RHSA-2019:3517","https://access.redhat.com/errata/RHSA-2019:3978","https://access.redhat.com/errata/RHSA-2019:3979","https://access.redhat.com/errata/RHSA-2019:4154","https://access.redhat.com/errata/RHSA-2019:4256","https://access.redhat.com/errata/RHSA-2020:0027","https://access.redhat.com/errata/RHSA-2020:0204","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/","https://seclists.org/bugtraq/2019/Nov/11","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.debian.org/security/2019/dsa-4531","https://www.oracle.com/security-alerts/cpuapr2020.html"],"published_time":"2019-09-19T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11779","summary":"In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.06791,"ranking_epss":0.91341,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00077.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html","https://bugs.eclipse.org/bugs/show_bug.cgi?id=551160","https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4WMHIM64Q35NGTR6R3ILZUL4MA4ANB5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFWQBNFTAVHPUYNGYO2TCPF5PCSWC2Z7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWNVTFA2CKXERXRYPYE2YFTZP4GNBGYY/","https://seclists.org/bugtraq/2019/Nov/25","https://usn.ubuntu.com/4137-1/","https://www.debian.org/security/2019/dsa-4570","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00077.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html","https://bugs.eclipse.org/bugs/show_bug.cgi?id=551160","https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4WMHIM64Q35NGTR6R3ILZUL4MA4ANB5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFWQBNFTAVHPUYNGYO2TCPF5PCSWC2Z7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWNVTFA2CKXERXRYPYE2YFTZP4GNBGYY/","https://seclists.org/bugtraq/2019/Nov/25","https://usn.ubuntu.com/4137-1/","https://www.debian.org/security/2019/dsa-4570"],"published_time":"2019-09-19T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14835","summary":"A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.","cvss":7.2,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21692,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en","http://www.openwall.com/lists/oss-security/2019/09/24/1","http://www.openwall.com/lists/oss-security/2019/10/03/1","http://www.openwall.com/lists/oss-security/2019/10/09/3","http://www.openwall.com/lists/oss-security/2019/10/09/7","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2827","https://access.redhat.com/errata/RHSA-2019:2828","https://access.redhat.com/errata/RHSA-2019:2829","https://access.redhat.com/errata/RHSA-2019:2830","https://access.redhat.com/errata/RHSA-2019:2854","https://access.redhat.com/errata/RHSA-2019:2862","https://access.redhat.com/errata/RHSA-2019:2863","https://access.redhat.com/errata/RHSA-2019:2864","https://access.redhat.com/errata/RHSA-2019:2865","https://access.redhat.com/errata/RHSA-2019:2866","https://access.redhat.com/errata/RHSA-2019:2867","https://access.redhat.com/errata/RHSA-2019:2869","https://access.redhat.com/errata/RHSA-2019:2889","https://access.redhat.com/errata/RHSA-2019:2899","https://access.redhat.com/errata/RHSA-2019:2900","https://access.redhat.com/errata/RHSA-2019:2901","https://access.redhat.com/errata/RHSA-2019:2924","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/","https://seclists.org/bugtraq/2019/Nov/11","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4135-1/","https://usn.ubuntu.com/4135-2/","https://www.debian.org/security/2019/dsa-4531","https://www.openwall.com/lists/oss-security/2019/09/17/1","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html","http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en","http://www.openwall.com/lists/oss-security/2019/09/24/1","http://www.openwall.com/lists/oss-security/2019/10/03/1","http://www.openwall.com/lists/oss-security/2019/10/09/3","http://www.openwall.com/lists/oss-security/2019/10/09/7","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2827","https://access.redhat.com/errata/RHSA-2019:2828","https://access.redhat.com/errata/RHSA-2019:2829","https://access.redhat.com/errata/RHSA-2019:2830","https://access.redhat.com/errata/RHSA-2019:2854","https://access.redhat.com/errata/RHSA-2019:2862","https://access.redhat.com/errata/RHSA-2019:2863","https://access.redhat.com/errata/RHSA-2019:2864","https://access.redhat.com/errata/RHSA-2019:2865","https://access.redhat.com/errata/RHSA-2019:2866","https://access.redhat.com/errata/RHSA-2019:2867","https://access.redhat.com/errata/RHSA-2019:2869","https://access.redhat.com/errata/RHSA-2019:2889","https://access.redhat.com/errata/RHSA-2019:2899","https://access.redhat.com/errata/RHSA-2019:2900","https://access.redhat.com/errata/RHSA-2019:2901","https://access.redhat.com/errata/RHSA-2019:2924","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/","https://seclists.org/bugtraq/2019/Nov/11","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20191031-0005/","https://usn.ubuntu.com/4135-1/","https://usn.ubuntu.com/4135-2/","https://www.debian.org/security/2019/dsa-4531","https://www.openwall.com/lists/oss-security/2019/09/17/1"],"published_time":"2019-09-17T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16239","summary":"process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.08525,"ranking_epss":0.92395,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/","https://seclists.org/bugtraq/2020/Jan/31","https://t2.fi/schedule/2019/","https://usn.ubuntu.com/4565-1/","https://www.debian.org/security/2020/dsa-4607","http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/","https://seclists.org/bugtraq/2020/Jan/31","https://t2.fi/schedule/2019/","https://usn.ubuntu.com/4565-1/","https://www.debian.org/security/2020/dsa-4607"],"published_time":"2019-09-17T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5481","summary":"Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03017,"ranking_epss":0.86629,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html","https://curl.haxx.se/docs/CVE-2019-5481.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/","https://seclists.org/bugtraq/2020/Feb/36","https://security.gentoo.org/glsa/202003-29","https://security.netapp.com/advisory/ntap-20191004-0003/","https://www.debian.org/security/2020/dsa-4633","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html","https://curl.haxx.se/docs/CVE-2019-5481.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/","https://seclists.org/bugtraq/2020/Feb/36","https://security.gentoo.org/glsa/202003-29","https://security.netapp.com/advisory/ntap-20191004-0003/","https://www.debian.org/security/2020/dsa-4633","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2019-09-16T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-5482","summary":"Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.06912,"ranking_epss":0.91423,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html","https://curl.haxx.se/docs/CVE-2019-5482.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/","https://seclists.org/bugtraq/2020/Feb/36","https://security.gentoo.org/glsa/202003-29","https://security.netapp.com/advisory/ntap-20191004-0003/","https://security.netapp.com/advisory/ntap-20200416-0003/","https://www.debian.org/security/2020/dsa-4633","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html","https://curl.haxx.se/docs/CVE-2019-5482.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/","https://seclists.org/bugtraq/2020/Feb/36","https://security.gentoo.org/glsa/202003-29","https://security.netapp.com/advisory/ntap-20191004-0003/","https://security.netapp.com/advisory/ntap-20200416-0003/","https://www.debian.org/security/2020/dsa-4633","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html"],"published_time":"2019-09-16T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16319","summary":"In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00701,"ranking_epss":0.72077,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://www.wireshark.org/security/wnpa-sec-2019-21.html","http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html","https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020","https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a","https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html","https://www.wireshark.org/security/wnpa-sec-2019-21.html"],"published_time":"2019-09-15T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15030","summary":"In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.","cvss":4.4,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00079,"ranking_epss":0.23355,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/09/10/3","https://access.redhat.com/errata/RHSA-2020:0740","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4135-1/","https://usn.ubuntu.com/4135-2/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/09/10/3","https://access.redhat.com/errata/RHSA-2020:0740","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4135-1/","https://usn.ubuntu.com/4135-2/"],"published_time":"2019-09-13T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15031","summary":"In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.","cvss":4.4,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15991,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/09/10/4","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4135-1/","https://usn.ubuntu.com/4135-2/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/09/10/4","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4135-1/","https://usn.ubuntu.com/4135-2/"],"published_time":"2019-09-13T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16231","summary":"drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","cvss":4.1,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.1,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05356,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4225-1/","https://usn.ubuntu.com/4225-2/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/"],"published_time":"2019-09-11T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16232","summary":"drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","cvss":4.1,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4284-1/","https://usn.ubuntu.com/4285-1/","https://usn.ubuntu.com/4287-1/","https://usn.ubuntu.com/4287-2/"],"published_time":"2019-09-11T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16233","summary":"drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","cvss":4.1,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00091,"ranking_epss":0.25677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4346-1/","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4226-1/","https://usn.ubuntu.com/4227-1/","https://usn.ubuntu.com/4227-2/","https://usn.ubuntu.com/4346-1/"],"published_time":"2019-09-11T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16234","summary":"drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11477,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4346-1/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html","https://lkml.org/lkml/2019/9/9/487","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4342-1/","https://usn.ubuntu.com/4344-1/","https://usn.ubuntu.com/4345-1/","https://usn.ubuntu.com/4346-1/"],"published_time":"2019-09-11T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16167","summary":"sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01477,"ranking_epss":0.8101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html","https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6","https://github.com/sysstat/sysstat/issues/230","https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/","https://usn.ubuntu.com/4242-1/","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html","https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6","https://github.com/sysstat/sysstat/issues/230","https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/","https://usn.ubuntu.com/4242-1/"],"published_time":"2019-09-09T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2016-10937","summary":"IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.5488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00002.html","https://bugs.debian.org/939702","https://github.com/lefcha/imapfilter/issues/142","https://lists.debian.org/debian-lts-announce/2019/10/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBNDFMAIUA6PQMV2P6OKIP7JZQEWX7D2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQUH2TOCNEST7JB2RJVVJT3RZS5XZCFZ/","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00042.html","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00002.html","https://bugs.debian.org/939702","https://github.com/lefcha/imapfilter/issues/142","https://lists.debian.org/debian-lts-announce/2019/10/msg00040.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBNDFMAIUA6PQMV2P6OKIP7JZQEWX7D2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQUH2TOCNEST7JB2RJVVJT3RZS5XZCFZ/"],"published_time":"2019-09-08T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9455","summary":"In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.","cvss":2.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":2.3,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06131,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","https://source.android.com/security/bulletin/pixel/2019-09-01","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html","https://source.android.com/security/bulletin/pixel/2019-09-01"],"published_time":"2019-09-06T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9456","summary":"In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10516,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://source.android.com/security/bulletin/pixel/2019-09-01","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://source.android.com/security/bulletin/pixel/2019-09-01"],"published_time":"2019-09-06T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9458","summary":"In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.0441,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","https://source.android.com/security/bulletin/pixel/2019-09-01","http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html","https://source.android.com/security/bulletin/pixel/2019-09-01"],"published_time":"2019-09-06T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9855","summary":"LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00437,"ranking_epss":0.63087,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/"],"published_time":"2019-09-06T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9854","summary":"LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0076,"ranking_epss":0.73378,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/","https://seclists.org/bugtraq/2019/Sep/17","https://usn.ubuntu.com/4138-1/","https://www.debian.org/security/2019/dsa-4519","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/","https://bugzilla.redhat.com/show_bug.cgi?id=1769907","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/","https://seclists.org/bugtraq/2019/Sep/17","https://usn.ubuntu.com/4138-1/","https://www.debian.org/security/2019/dsa-4519","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/"],"published_time":"2019-09-06T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-16056","summary":"An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01217,"ranking_epss":0.79057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html","https://access.redhat.com/errata/RHSA-2019:3725","https://access.redhat.com/errata/RHSA-2019:3948","https://bugs.python.org/issue34155","https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9","https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/","https://security.netapp.com/advisory/ntap-20190926-0005/","https://usn.ubuntu.com/4151-1/","https://usn.ubuntu.com/4151-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html","https://access.redhat.com/errata/RHSA-2019:3725","https://access.redhat.com/errata/RHSA-2019:3948","https://bugs.python.org/issue34155","https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9","https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E","https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html","https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/","https://security.netapp.com/advisory/ntap-20190926-0005/","https://usn.ubuntu.com/4151-1/","https://usn.ubuntu.com/4151-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"published_time":"2019-09-06T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14813","summary":"A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.","cvss":7.3,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.3,"cvss_v4":null,"epss":0.08454,"ranking_epss":0.92363,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2594","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813","https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","https://seclists.org/bugtraq/2019/Sep/15","https://security.gentoo.org/glsa/202004-03","https://www.debian.org/security/2019/dsa-4518","http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2594","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813","https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","https://seclists.org/bugtraq/2019/Sep/15","https://security.gentoo.org/glsa/202004-03","https://www.debian.org/security/2019/dsa-4518"],"published_time":"2019-09-06T14:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15939","summary":"An issue was discovered in OpenCV 4.1.0. There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp.","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00721,"ranking_epss":0.72552,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html","https://github.com/OpenCV/opencv/issues/15287","https://github.com/opencv/opencv/pull/15382","https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html","https://github.com/OpenCV/opencv/issues/15287","https://github.com/opencv/opencv/pull/15382","https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"],"published_time":"2019-09-05T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-18595","summary":"An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31925,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8"],"published_time":"2019-09-04T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15919","summary":"An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.","cvss":3.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17692,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a","https://security.netapp.com/advisory/ntap-20191004-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a","https://security.netapp.com/advisory/ntap-20191004-0001/"],"published_time":"2019-09-04T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15920","summary":"An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00548,"ranking_epss":0.67953,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e","https://security.netapp.com/advisory/ntap-20191004-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e","https://security.netapp.com/advisory/ntap-20191004-0001/"],"published_time":"2019-09-04T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15921","summary":"An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6","https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2","https://security.netapp.com/advisory/ntap-20191004-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6","https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2","https://security.netapp.com/advisory/ntap-20191004-0001/"],"published_time":"2019-09-04T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15917","summary":"An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5","https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191004-0001/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5","https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://seclists.org/bugtraq/2020/Jan/10","https://security.netapp.com/advisory/ntap-20191004-0001/"],"published_time":"2019-09-04T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15902","summary":"A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.","cvss":5.6,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25053,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://grsecurity.net/teardown_of_a_failed_linux_lts_spectre_fix.php","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.debian.org/security/2019/dsa-4531","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://grsecurity.net/teardown_of_a_failed_linux_lts_spectre_fix.php","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20191004-0001/","https://usn.ubuntu.com/4157-1/","https://usn.ubuntu.com/4157-2/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.debian.org/security/2019/dsa-4531"],"published_time":"2019-09-04T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14811","summary":"A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.","cvss":7.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.3,"cvss_v4":null,"epss":0.01726,"ranking_epss":0.82464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2594","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811","https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","https://seclists.org/bugtraq/2019/Sep/15","https://security.gentoo.org/glsa/202004-03","https://www.debian.org/security/2019/dsa-4518","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2594","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811","https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","https://seclists.org/bugtraq/2019/Sep/15","https://security.gentoo.org/glsa/202004-03","https://www.debian.org/security/2019/dsa-4518"],"published_time":"2019-09-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14817","summary":"A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.","cvss":7.3,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00362,"ranking_epss":0.58382,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2594","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817","https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","https://seclists.org/bugtraq/2019/Sep/15","https://security.gentoo.org/glsa/202004-03","https://www.debian.org/security/2019/dsa-4518","http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","https://access.redhat.com/errata/RHBA-2019:2824","https://access.redhat.com/errata/RHSA-2019:2594","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817","https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","https://seclists.org/bugtraq/2019/Sep/15","https://security.gentoo.org/glsa/202004-03","https://www.debian.org/security/2019/dsa-4518"],"published_time":"2019-09-03T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15847","summary":"The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00494,"ranking_epss":0.65782,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html","https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html","http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html","https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481"],"published_time":"2019-09-02T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15666","summary":"An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.4,"cvss_v4":null,"epss":0.05225,"ranking_epss":0.89968,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://security.netapp.com/advisory/ntap-20191004-0001/","https://support.f5.com/csp/article/K53420251?utm_source=f5support&amp%3Butm_medium=RSS","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://security.netapp.com/advisory/ntap-20191004-0001/","https://support.f5.com/csp/article/K53420251?utm_source=f5support&amp%3Butm_medium=RSS"],"published_time":"2019-08-27T05:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15538","summary":"An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.16428,"ranking_epss":0.94894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fb254aa983bf190cfd685d40c64a480a9bafaee","https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/","https://lore.kernel.org/linux-xfs/20190823035528.GH1037422%40magnolia/","https://lore.kernel.org/linux-xfs/20190823192433.GA8736%40eldamar.local","https://security.netapp.com/advisory/ntap-20191004-0001/","https://support.f5.com/csp/article/K32592426?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4144-1/","https://usn.ubuntu.com/4147-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fb254aa983bf190cfd685d40c64a480a9bafaee","https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/","https://lore.kernel.org/linux-xfs/20190823035528.GH1037422%40magnolia/","https://lore.kernel.org/linux-xfs/20190823192433.GA8736%40eldamar.local","https://security.netapp.com/advisory/ntap-20191004-0001/","https://support.f5.com/csp/article/K32592426?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4144-1/","https://usn.ubuntu.com/4147-1/"],"published_time":"2019-08-25T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-10086","summary":"In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.","cvss":7.3,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.3,"cvss_v4":null,"epss":0.01239,"ranking_epss":0.79252,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html","http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4%40apache.org%3e","https://access.redhat.com/errata/RHSA-2019:4317","https://access.redhat.com/errata/RHSA-2020:0057","https://access.redhat.com/errata/RHSA-2020:0194","https://access.redhat.com/errata/RHSA-2020:0804","https://access.redhat.com/errata/RHSA-2020:0805","https://access.redhat.com/errata/RHSA-2020:0806","https://access.redhat.com/errata/RHSA-2020:0811","https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc%40%3Cissues.commons.apache.org%3E","https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E","https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125%40%3Ccommits.tinkerpop.apache.org%3E","https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E","https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E","https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E","https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E","https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db%40%3Cdev.rocketmq.apache.org%3E","https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825%40%3Ccommits.dolphinscheduler.apache.org%3E","https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9%40%3Cdev.brooklyn.apache.org%3E","https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c%40%3Ccommits.dolphinscheduler.apache.org%3E","https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba%40%3Ccommits.atlas.apache.org%3E","https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b%40%3Ccommits.nifi.apache.org%3E","https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f%40%3Cdev.atlas.apache.org%3E","https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html","http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4%40apache.org%3e","https://access.redhat.com/errata/RHSA-2019:4317","https://access.redhat.com/errata/RHSA-2020:0057","https://access.redhat.com/errata/RHSA-2020:0194","https://access.redhat.com/errata/RHSA-2020:0804","https://access.redhat.com/errata/RHSA-2020:0805","https://access.redhat.com/errata/RHSA-2020:0806","https://access.redhat.com/errata/RHSA-2020:0811","https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc%40%3Cissues.commons.apache.org%3E","https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E","https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125%40%3Ccommits.tinkerpop.apache.org%3E","https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E","https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E","https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E","https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f%40%3Cdev.shiro.apache.org%3E","https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E","https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db%40%3Cdev.rocketmq.apache.org%3E","https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825%40%3Ccommits.dolphinscheduler.apache.org%3E","https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9%40%3Cdev.brooklyn.apache.org%3E","https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c%40%3Ccommits.dolphinscheduler.apache.org%3E","https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c%40%3Cdev.atlas.apache.org%3E","https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba%40%3Ccommits.atlas.apache.org%3E","https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b%40%3Ccommits.nifi.apache.org%3E","https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534%40%3Cissues.nifi.apache.org%3E","https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f%40%3Cdev.atlas.apache.org%3E","https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpujul2022.html","https://www.oracle.com/security-alerts/cpuoct2021.html"],"published_time":"2019-08-20T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-2126","summary":"In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-127702368.","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.09309,"ranking_epss":0.92759,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://source.android.com/security/bulletin/2019-08-01","https://usn.ubuntu.com/4199-1/","http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/","https://source.android.com/security/bulletin/2019-08-01","https://usn.ubuntu.com/4199-1/"],"published_time":"2019-08-20T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15211","summary":"An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c666355e60ddb4748ead3bdd983e3f7f2224aaf0","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=775f90f43cfd6f8ac6c15251ce68e604453da226","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4145-1/","https://usn.ubuntu.com/4147-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c666355e60ddb4748ead3bdd983e3f7f2224aaf0","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=775f90f43cfd6f8ac6c15251ce68e604453da226","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4145-1/","https://usn.ubuntu.com/4147-1/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15212","summary":"An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=64aa96c96f594a77eb8d945df21ec76dd35573b3","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=64aa96c96f594a77eb8d945df21ec76dd35573b3","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15213","summary":"An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00176,"ranking_epss":0.39141,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced","http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15214","summary":"An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.","cvss":6.4,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24487,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15215","summary":"An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15516,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eff73de2b1600ad8230692f00bc0ab49b166512a","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=b68d3c254cf294f8a802582094fa3251d6de5247","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4145-1/","https://usn.ubuntu.com/4147-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eff73de2b1600ad8230692f00bc0ab49b166512a","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=b68d3c254cf294f8a802582094fa3251d6de5247","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4145-1/","https://usn.ubuntu.com/4147-1/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15216","summary":"An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00053,"ranking_epss":0.16565,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.14","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef61eb43ada6c1d6b94668f0f514e4c268093ff3","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=f0b1f2952022c75394c0eef2afeb17af90f9227e","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.14","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef61eb43ada6c1d6b94668f0f514e4c268093ff3","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=f0b1f2952022c75394c0eef2afeb17af90f9227e","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15217","summary":"An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=9c0c178c24d828a7378f483309001329750aad64","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4302-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=9c0c178c24d828a7378f483309001329750aad64","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","https://usn.ubuntu.com/4302-1/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15218","summary":"An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://www.oracle.com/security-alerts/cpuApr2021.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://www.oracle.com/security-alerts/cpuApr2021.html"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15219","summary":"An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.29094,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=aaf6794922521df1c35c81e32cb2d0bb6a351e7b","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","http://www.openwall.com/lists/oss-security/2019/08/22/2","http://www.openwall.com/lists/oss-security/2019/08/22/3","http://www.openwall.com/lists/oss-security/2019/08/22/4","http://www.openwall.com/lists/oss-security/2019/08/22/5","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=aaf6794922521df1c35c81e32cb2d0bb6a351e7b"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15220","summary":"An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12462,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.1","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e41e2257f1094acc37618bf6c856115374c6922","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=082c09653e43e33a6a56f8c57cf051eeacae9d5f","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.1","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e41e2257f1094acc37618bf6c856115374c6922","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=082c09653e43e33a6a56f8c57cf051eeacae9d5f","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15221","summary":"An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00147,"ranking_epss":0.352,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4286-1/","https://usn.ubuntu.com/4286-2/"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15222","summary":"An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05989,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d78e1c2b7f4be00bbe62141603a631dc7812f35","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=3ec1dad62657fef22282536d7532dbb65eee778a","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://www.openwall.com/lists/oss-security/2019/08/20/2","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.8","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d78e1c2b7f4be00bbe62141603a631dc7812f35","https://security.netapp.com/advisory/ntap-20190905-0002/","https://syzkaller.appspot.com/bug?id=3ec1dad62657fef22282536d7532dbb65eee778a"],"published_time":"2019-08-19T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2017-18551","summary":"An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00132,"ranking_epss":0.32765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa","https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa","https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS"],"published_time":"2019-08-19T02:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15145","summary":"DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00469,"ranking_epss":0.64554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/298/","https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/298/","https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032"],"published_time":"2019-08-18T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15141","summary":"WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_dirwrite.c of LibTIFF. NOTE: this occurs because of an incomplete fix for CVE-2019-11597.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.25332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1560","https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/issues/1560","https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112"],"published_time":"2019-08-18T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15142","summary":"In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00878,"ranking_epss":0.75379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/296/","https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/296/","https://sourceforge.net/p/djvu/djvulibre-git/ci/970fb11a296b5bbdc5e8425851253d2c5913c45e/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032"],"published_time":"2019-08-18T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15143","summary":"In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00878,"ranking_epss":0.75379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/297/","https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/297/","https://sourceforge.net/p/djvu/djvulibre-git/ci/b1f4e1b2187d9e5010cd01ceccf20b4a11ce723f/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032"],"published_time":"2019-08-18T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15144","summary":"In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate<TYPE>::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00658,"ranking_epss":0.71099,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/299/","https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html","https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html","https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/","https://security.gentoo.org/glsa/202007-36","https://sourceforge.net/p/djvu/bugs/299/","https://sourceforge.net/p/djvu/djvulibre-git/ci/e15d51510048927f172f1bf1f27ede65907d940d/","https://usn.ubuntu.com/4198-1/","https://www.debian.org/security/2021/dsa-5032"],"published_time":"2019-08-18T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15118","summary":"check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00133,"ranking_epss":0.32939,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=19bce474c45be69a284ecee660aa12d8f1e88f18","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://lore.kernel.org/lkml/20190815043554.16623-1-benquike%40gmail.com/","https://seclists.org/bugtraq/2019/Nov/11","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20190905-0002/","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.debian.org/security/2019/dsa-4531","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=19bce474c45be69a284ecee660aa12d8f1e88f18","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html","https://lore.kernel.org/lkml/20190815043554.16623-1-benquike%40gmail.com/","https://seclists.org/bugtraq/2019/Nov/11","https://seclists.org/bugtraq/2019/Sep/41","https://security.netapp.com/advisory/ntap-20190905-0002/","https://usn.ubuntu.com/4147-1/","https://usn.ubuntu.com/4162-1/","https://usn.ubuntu.com/4162-2/","https://usn.ubuntu.com/4163-1/","https://usn.ubuntu.com/4163-2/","https://www.debian.org/security/2019/dsa-4531"],"published_time":"2019-08-16T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15098","summary":"drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.37209,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/09/27/1","http://www.openwall.com/lists/oss-security/2019/09/27/2","http://www.openwall.com/lists/oss-security/2019/09/27/3","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20190905-0002/","https://support.f5.com/csp/article/K61214359","https://support.f5.com/csp/article/K61214359?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4184-1/","https://usn.ubuntu.com/4185-1/","https://usn.ubuntu.com/4186-1/","https://usn.ubuntu.com/4186-2/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","http://www.openwall.com/lists/oss-security/2019/09/27/1","http://www.openwall.com/lists/oss-security/2019/09/27/2","http://www.openwall.com/lists/oss-security/2019/09/27/3","https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html","https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u","https://seclists.org/bugtraq/2019/Nov/11","https://security.netapp.com/advisory/ntap-20190905-0002/","https://support.f5.com/csp/article/K61214359","https://support.f5.com/csp/article/K61214359?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4184-1/","https://usn.ubuntu.com/4185-1/","https://usn.ubuntu.com/4186-1/","https://usn.ubuntu.com/4186-2/"],"published_time":"2019-08-16T02:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-15090","summary":"An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c09581a52765a85f19fc35340127396d5e3379cc","https://github.com/torvalds/linux/commit/c09581a52765a85f19fc35340127396d5e3379cc","https://security.netapp.com/advisory/ntap-20190905-0002/","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c09581a52765a85f19fc35340127396d5e3379cc","https://github.com/torvalds/linux/commit/c09581a52765a85f19fc35340127396d5e3379cc","https://security.netapp.com/advisory/ntap-20190905-0002/","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/"],"published_time":"2019-08-16T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9850","summary":"LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02907,"ranking_epss":0.86385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVSDPZJG3UA43X3JXRHJAWXLDZEW77LM/","https://seclists.org/bugtraq/2019/Aug/28","https://usn.ubuntu.com/4102-1/","https://www.debian.org/security/2019/dsa-4501","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVSDPZJG3UA43X3JXRHJAWXLDZEW77LM/","https://seclists.org/bugtraq/2019/Aug/28","https://usn.ubuntu.com/4102-1/","https://www.debian.org/security/2019/dsa-4501","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850"],"published_time":"2019-08-15T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9851","summary":"LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.85784,"ranking_epss":0.99383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/","https://seclists.org/bugtraq/2019/Aug/28","https://usn.ubuntu.com/4102-1/","https://www.debian.org/security/2019/dsa-4501","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/","https://seclists.org/bugtraq/2019/Aug/28","https://usn.ubuntu.com/4102-1/","https://www.debian.org/security/2019/dsa-4501","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851"],"published_time":"2019-08-15T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9852","summary":"LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.28909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/","https://seclists.org/bugtraq/2019/Aug/28","https://seclists.org/bugtraq/2019/Sep/17","https://usn.ubuntu.com/4102-1/","https://www.debian.org/security/2019/dsa-4501","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/","https://seclists.org/bugtraq/2019/Aug/28","https://seclists.org/bugtraq/2019/Sep/17","https://usn.ubuntu.com/4102-1/","https://www.debian.org/security/2019/dsa-4501","https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852"],"published_time":"2019-08-15T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-12854","summary":"Due to incorrect string termination, Squid cachemgr.cgi 4.0 through 4.7 may access unallocated memory. On systems with memory access protections, this can cause the CGI process to terminate unexpectedly, resulting in a denial of service for all clients using it.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.44493,"ranking_epss":0.97575,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html","http://www.squid-cache.org/Advisories/SQUID-2019_1.txt","http://www.squid-cache.org/Versions/v4/changesets/squid-4-2981a957716c61ff7e21eee1d7d6eb5a237e466d.patch","https://bugs.squid-cache.org/show_bug.cgi?id=4937","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/","https://seclists.org/bugtraq/2019/Aug/42","https://usn.ubuntu.com/4213-1/","https://www.debian.org/security/2019/dsa-4507","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html","http://www.squid-cache.org/Advisories/SQUID-2019_1.txt","http://www.squid-cache.org/Versions/v4/changesets/squid-4-2981a957716c61ff7e21eee1d7d6eb5a237e466d.patch","https://bugs.squid-cache.org/show_bug.cgi?id=4937","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/","https://seclists.org/bugtraq/2019/Aug/42","https://usn.ubuntu.com/4213-1/","https://www.debian.org/security/2019/dsa-4507"],"published_time":"2019-08-15T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9506","summary":"The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.","cvss":7.6,"cvss_version":3.0,"cvss_v2":4.8,"cvss_v3":7.6,"cvss_v4":null,"epss":0.04458,"ranking_epss":0.89089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","http://seclists.org/fulldisclosure/2019/Aug/11","http://seclists.org/fulldisclosure/2019/Aug/13","http://seclists.org/fulldisclosure/2019/Aug/14","http://seclists.org/fulldisclosure/2019/Aug/15","http://www.cs.ox.ac.uk/publications/publication12404-abstract.html","http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en","https://access.redhat.com/errata/RHSA-2019:2975","https://access.redhat.com/errata/RHSA-2019:3055","https://access.redhat.com/errata/RHSA-2019:3076","https://access.redhat.com/errata/RHSA-2019:3089","https://access.redhat.com/errata/RHSA-2019:3165","https://access.redhat.com/errata/RHSA-2019:3187","https://access.redhat.com/errata/RHSA-2019:3217","https://access.redhat.com/errata/RHSA-2019:3218","https://access.redhat.com/errata/RHSA-2019:3220","https://access.redhat.com/errata/RHSA-2019:3231","https://access.redhat.com/errata/RHSA-2019:3309","https://access.redhat.com/errata/RHSA-2019:3517","https://access.redhat.com/errata/RHSA-2020:0204","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/","https://www.kb.cert.org/vuls/id/918987/","https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","http://seclists.org/fulldisclosure/2019/Aug/11","http://seclists.org/fulldisclosure/2019/Aug/13","http://seclists.org/fulldisclosure/2019/Aug/14","http://seclists.org/fulldisclosure/2019/Aug/15","http://www.cs.ox.ac.uk/publications/publication12404-abstract.html","http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en","https://access.redhat.com/errata/RHSA-2019:2975","https://access.redhat.com/errata/RHSA-2019:3055","https://access.redhat.com/errata/RHSA-2019:3076","https://access.redhat.com/errata/RHSA-2019:3089","https://access.redhat.com/errata/RHSA-2019:3165","https://access.redhat.com/errata/RHSA-2019:3187","https://access.redhat.com/errata/RHSA-2019:3217","https://access.redhat.com/errata/RHSA-2019:3218","https://access.redhat.com/errata/RHSA-2019:3220","https://access.redhat.com/errata/RHSA-2019:3231","https://access.redhat.com/errata/RHSA-2019:3309","https://access.redhat.com/errata/RHSA-2019:3517","https://access.redhat.com/errata/RHSA-2020:0204","https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html","https://usn.ubuntu.com/4115-1/","https://usn.ubuntu.com/4118-1/","https://usn.ubuntu.com/4147-1/","https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/","https://www.kb.cert.org/vuls/id/918987/","https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"],"published_time":"2019-08-14T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14973","summary":"_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00965,"ranking_epss":0.7661,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html","http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html","https://gitlab.com/libtiff/libtiff/merge_requests/90","https://lists.debian.org/debian-lts-announce/2019/08/msg00031.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63BVT6N5KQPHWOWM4B3I7Z3ODBXUVNPS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADNPG7JJTRRK22GUVTAFH3GJ6WGKUZJB/","https://seclists.org/bugtraq/2019/Nov/5","https://seclists.org/bugtraq/2020/Jan/32","https://www.debian.org/security/2020/dsa-4608","https://www.debian.org/security/2020/dsa-4670","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html","http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html","http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html","https://gitlab.com/libtiff/libtiff/merge_requests/90","https://lists.debian.org/debian-lts-announce/2019/08/msg00031.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63BVT6N5KQPHWOWM4B3I7Z3ODBXUVNPS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADNPG7JJTRRK22GUVTAFH3GJ6WGKUZJB/","https://seclists.org/bugtraq/2019/Nov/5","https://seclists.org/bugtraq/2020/Jan/32","https://www.debian.org/security/2020/dsa-4608","https://www.debian.org/security/2020/dsa-4670"],"published_time":"2019-08-14T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9518","summary":"Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03645,"ranking_epss":0.87873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://seclists.org/fulldisclosure/2019/Aug/16","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:3892","https://access.redhat.com/errata/RHSA-2019:4352","https://access.redhat.com/errata/RHSA-2020:0727","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E","https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E","https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Sep/18","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K46011592","https://support.f5.com/csp/article/K46011592?utm_source=f5support&amp%3Butm_medium=RSS","https://www.debian.org/security/2019/dsa-4520","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://seclists.org/fulldisclosure/2019/Aug/16","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:3892","https://access.redhat.com/errata/RHSA-2019:4352","https://access.redhat.com/errata/RHSA-2020:0727","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E","https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E","https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Sep/18","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K46011592","https://support.f5.com/csp/article/K46011592?utm_source=f5support&amp%3Butm_medium=RSS","https://www.debian.org/security/2019/dsa-4520","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9511","summary":"Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.13948,"ranking_epss":0.94344,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html","https://access.redhat.com/errata/RHSA-2019:2692","https://access.redhat.com/errata/RHSA-2019:2745","https://access.redhat.com/errata/RHSA-2019:2746","https://access.redhat.com/errata/RHSA-2019:2775","https://access.redhat.com/errata/RHSA-2019:2799","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2949","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3041","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://access.redhat.com/errata/RHSA-2019:4018","https://access.redhat.com/errata/RHSA-2019:4019","https://access.redhat.com/errata/RHSA-2019:4020","https://access.redhat.com/errata/RHSA-2019:4021","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/","https://seclists.org/bugtraq/2019/Aug/40","https://seclists.org/bugtraq/2019/Sep/1","https://security.netapp.com/advisory/ntap-20190823-0002/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4099-1/","https://www.debian.org/security/2019/dsa-4505","https://www.debian.org/security/2019/dsa-4511","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html","https://access.redhat.com/errata/RHSA-2019:2692","https://access.redhat.com/errata/RHSA-2019:2745","https://access.redhat.com/errata/RHSA-2019:2746","https://access.redhat.com/errata/RHSA-2019:2775","https://access.redhat.com/errata/RHSA-2019:2799","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2949","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3041","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://access.redhat.com/errata/RHSA-2019:4018","https://access.redhat.com/errata/RHSA-2019:4019","https://access.redhat.com/errata/RHSA-2019:4020","https://access.redhat.com/errata/RHSA-2019:4021","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/","https://seclists.org/bugtraq/2019/Aug/40","https://seclists.org/bugtraq/2019/Sep/1","https://security.netapp.com/advisory/ntap-20190823-0002/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4099-1/","https://www.debian.org/security/2019/dsa-4505","https://www.debian.org/security/2019/dsa-4511","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9513","summary":"Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06705,"ranking_epss":0.91274,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html","https://access.redhat.com/errata/RHSA-2019:2692","https://access.redhat.com/errata/RHSA-2019:2745","https://access.redhat.com/errata/RHSA-2019:2746","https://access.redhat.com/errata/RHSA-2019:2775","https://access.redhat.com/errata/RHSA-2019:2799","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2949","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3041","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/","https://seclists.org/bugtraq/2019/Aug/40","https://seclists.org/bugtraq/2019/Sep/1","https://security.netapp.com/advisory/ntap-20190823-0002/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4099-1/","https://www.debian.org/security/2019/dsa-4505","https://www.debian.org/security/2019/dsa-4511","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html","https://access.redhat.com/errata/RHSA-2019:2692","https://access.redhat.com/errata/RHSA-2019:2745","https://access.redhat.com/errata/RHSA-2019:2746","https://access.redhat.com/errata/RHSA-2019:2775","https://access.redhat.com/errata/RHSA-2019:2799","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2949","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3041","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/","https://seclists.org/bugtraq/2019/Aug/40","https://seclists.org/bugtraq/2019/Sep/1","https://security.netapp.com/advisory/ntap-20190823-0002/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4099-1/","https://www.debian.org/security/2019/dsa-4505","https://www.debian.org/security/2019/dsa-4511","https://www.debian.org/security/2020/dsa-4669","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9514","summary":"Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09483,"ranking_epss":0.92837,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html","http://seclists.org/fulldisclosure/2019/Aug/16","http://www.openwall.com/lists/oss-security/2019/08/20/1","http://www.openwall.com/lists/oss-security/2023/10/18/8","https://access.redhat.com/errata/RHSA-2019:2594","https://access.redhat.com/errata/RHSA-2019:2661","https://access.redhat.com/errata/RHSA-2019:2682","https://access.redhat.com/errata/RHSA-2019:2690","https://access.redhat.com/errata/RHSA-2019:2726","https://access.redhat.com/errata/RHSA-2019:2766","https://access.redhat.com/errata/RHSA-2019:2769","https://access.redhat.com/errata/RHSA-2019:2796","https://access.redhat.com/errata/RHSA-2019:2861","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3131","https://access.redhat.com/errata/RHSA-2019:3245","https://access.redhat.com/errata/RHSA-2019:3265","https://access.redhat.com/errata/RHSA-2019:3892","https://access.redhat.com/errata/RHSA-2019:3906","https://access.redhat.com/errata/RHSA-2019:4018","https://access.redhat.com/errata/RHSA-2019:4019","https://access.redhat.com/errata/RHSA-2019:4020","https://access.redhat.com/errata/RHSA-2019:4021","https://access.redhat.com/errata/RHSA-2019:4040","https://access.redhat.com/errata/RHSA-2019:4041","https://access.redhat.com/errata/RHSA-2019:4042","https://access.redhat.com/errata/RHSA-2019:4045","https://access.redhat.com/errata/RHSA-2019:4269","https://access.redhat.com/errata/RHSA-2019:4273","https://access.redhat.com/errata/RHSA-2019:4352","https://access.redhat.com/errata/RHSA-2020:0406","https://access.redhat.com/errata/RHSA-2020:0727","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Aug/31","https://seclists.org/bugtraq/2019/Aug/43","https://seclists.org/bugtraq/2019/Sep/18","https://security.netapp.com/advisory/ntap-20190823-0001/","https://security.netapp.com/advisory/ntap-20190823-0004/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K01988340","https://support.f5.com/csp/article/K01988340?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4308-1/","https://www.debian.org/security/2019/dsa-4503","https://www.debian.org/security/2019/dsa-4508","https://www.debian.org/security/2019/dsa-4520","https://www.debian.org/security/2020/dsa-4669","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html","http://seclists.org/fulldisclosure/2019/Aug/16","http://www.openwall.com/lists/oss-security/2019/08/20/1","http://www.openwall.com/lists/oss-security/2023/10/18/8","https://access.redhat.com/errata/RHSA-2019:2594","https://access.redhat.com/errata/RHSA-2019:2661","https://access.redhat.com/errata/RHSA-2019:2682","https://access.redhat.com/errata/RHSA-2019:2690","https://access.redhat.com/errata/RHSA-2019:2726","https://access.redhat.com/errata/RHSA-2019:2766","https://access.redhat.com/errata/RHSA-2019:2769","https://access.redhat.com/errata/RHSA-2019:2796","https://access.redhat.com/errata/RHSA-2019:2861","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3131","https://access.redhat.com/errata/RHSA-2019:3245","https://access.redhat.com/errata/RHSA-2019:3265","https://access.redhat.com/errata/RHSA-2019:3892","https://access.redhat.com/errata/RHSA-2019:3906","https://access.redhat.com/errata/RHSA-2019:4018","https://access.redhat.com/errata/RHSA-2019:4019","https://access.redhat.com/errata/RHSA-2019:4020","https://access.redhat.com/errata/RHSA-2019:4021","https://access.redhat.com/errata/RHSA-2019:4040","https://access.redhat.com/errata/RHSA-2019:4041","https://access.redhat.com/errata/RHSA-2019:4042","https://access.redhat.com/errata/RHSA-2019:4045","https://access.redhat.com/errata/RHSA-2019:4269","https://access.redhat.com/errata/RHSA-2019:4273","https://access.redhat.com/errata/RHSA-2019:4352","https://access.redhat.com/errata/RHSA-2020:0406","https://access.redhat.com/errata/RHSA-2020:0727","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E","https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Aug/31","https://seclists.org/bugtraq/2019/Aug/43","https://seclists.org/bugtraq/2019/Sep/18","https://security.netapp.com/advisory/ntap-20190823-0001/","https://security.netapp.com/advisory/ntap-20190823-0004/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K01988340","https://support.f5.com/csp/article/K01988340?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4308-1/","https://www.debian.org/security/2019/dsa-4503","https://www.debian.org/security/2019/dsa-4508","https://www.debian.org/security/2019/dsa-4520","https://www.debian.org/security/2020/dsa-4669","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9515","summary":"Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09046,"ranking_epss":0.92652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://seclists.org/fulldisclosure/2019/Aug/16","https://access.redhat.com/errata/RHSA-2019:2766","https://access.redhat.com/errata/RHSA-2019:2796","https://access.redhat.com/errata/RHSA-2019:2861","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:3892","https://access.redhat.com/errata/RHSA-2019:4018","https://access.redhat.com/errata/RHSA-2019:4019","https://access.redhat.com/errata/RHSA-2019:4020","https://access.redhat.com/errata/RHSA-2019:4021","https://access.redhat.com/errata/RHSA-2019:4040","https://access.redhat.com/errata/RHSA-2019:4041","https://access.redhat.com/errata/RHSA-2019:4042","https://access.redhat.com/errata/RHSA-2019:4045","https://access.redhat.com/errata/RHSA-2019:4352","https://access.redhat.com/errata/RHSA-2020:0727","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Aug/43","https://seclists.org/bugtraq/2019/Sep/18","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K50233772","https://support.f5.com/csp/article/K50233772?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4308-1/","https://www.debian.org/security/2019/dsa-4508","https://www.debian.org/security/2019/dsa-4520","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://seclists.org/fulldisclosure/2019/Aug/16","https://access.redhat.com/errata/RHSA-2019:2766","https://access.redhat.com/errata/RHSA-2019:2796","https://access.redhat.com/errata/RHSA-2019:2861","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:3892","https://access.redhat.com/errata/RHSA-2019:4018","https://access.redhat.com/errata/RHSA-2019:4019","https://access.redhat.com/errata/RHSA-2019:4020","https://access.redhat.com/errata/RHSA-2019:4021","https://access.redhat.com/errata/RHSA-2019:4040","https://access.redhat.com/errata/RHSA-2019:4041","https://access.redhat.com/errata/RHSA-2019:4042","https://access.redhat.com/errata/RHSA-2019:4045","https://access.redhat.com/errata/RHSA-2019:4352","https://access.redhat.com/errata/RHSA-2020:0727","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E","https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Aug/43","https://seclists.org/bugtraq/2019/Sep/18","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K50233772","https://support.f5.com/csp/article/K50233772?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4308-1/","https://www.debian.org/security/2019/dsa-4508","https://www.debian.org/security/2019/dsa-4520","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9516","summary":"Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02173,"ranking_epss":0.84349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html","http://seclists.org/fulldisclosure/2019/Aug/16","https://access.redhat.com/errata/RHSA-2019:2745","https://access.redhat.com/errata/RHSA-2019:2746","https://access.redhat.com/errata/RHSA-2019:2775","https://access.redhat.com/errata/RHSA-2019:2799","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2946","https://access.redhat.com/errata/RHSA-2019:2950","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Aug/40","https://security.netapp.com/advisory/ntap-20190823-0002/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4099-1/","https://www.debian.org/security/2019/dsa-4505","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html","http://seclists.org/fulldisclosure/2019/Aug/16","https://access.redhat.com/errata/RHSA-2019:2745","https://access.redhat.com/errata/RHSA-2019:2746","https://access.redhat.com/errata/RHSA-2019:2775","https://access.redhat.com/errata/RHSA-2019:2799","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2946","https://access.redhat.com/errata/RHSA-2019:2950","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:2966","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/","https://seclists.org/bugtraq/2019/Aug/24","https://seclists.org/bugtraq/2019/Aug/40","https://security.netapp.com/advisory/ntap-20190823-0002/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4099-1/","https://www.debian.org/security/2019/dsa-4505","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-9517","summary":"Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05964,"ranking_epss":0.90668,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://www.openwall.com/lists/oss-security/2019/08/15/7","https://access.redhat.com/errata/RHSA-2019:2893","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2946","https://access.redhat.com/errata/RHSA-2019:2949","https://access.redhat.com/errata/RHSA-2019:2950","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E","https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/","https://seclists.org/bugtraq/2019/Aug/47","https://security.gentoo.org/glsa/201909-04","https://security.netapp.com/advisory/ntap-20190823-0003/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://security.netapp.com/advisory/ntap-20190905-0003/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4113-1/","https://www.debian.org/security/2019/dsa-4509","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.synology.com/security/advisory/Synology_SA_19_33","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","http://www.openwall.com/lists/oss-security/2019/08/15/7","https://access.redhat.com/errata/RHSA-2019:2893","https://access.redhat.com/errata/RHSA-2019:2925","https://access.redhat.com/errata/RHSA-2019:2939","https://access.redhat.com/errata/RHSA-2019:2946","https://access.redhat.com/errata/RHSA-2019:2949","https://access.redhat.com/errata/RHSA-2019:2950","https://access.redhat.com/errata/RHSA-2019:2955","https://access.redhat.com/errata/RHSA-2019:3932","https://access.redhat.com/errata/RHSA-2019:3933","https://access.redhat.com/errata/RHSA-2019:3935","https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","https://kb.cert.org/vuls/id/605641/","https://kc.mcafee.com/corporate/index?page=content&id=SB10296","https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E","https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E","https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E","https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/","https://seclists.org/bugtraq/2019/Aug/47","https://security.gentoo.org/glsa/201909-04","https://security.netapp.com/advisory/ntap-20190823-0003/","https://security.netapp.com/advisory/ntap-20190823-0005/","https://security.netapp.com/advisory/ntap-20190905-0003/","https://support.f5.com/csp/article/K02591030","https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS","https://usn.ubuntu.com/4113-1/","https://www.debian.org/security/2019/dsa-4509","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.synology.com/security/advisory/Synology_SA_19_33"],"published_time":"2019-08-13T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14980","summary":"In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00197,"ranking_epss":0.41679,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/commit/c5d012a46ae22be9444326aa37969a3f75daa3ba","https://github.com/ImageMagick/ImageMagick/compare/7.0.8-41...7.0.8-42","https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830","https://github.com/ImageMagick/ImageMagick6/issues/43","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/commit/c5d012a46ae22be9444326aa37969a3f75daa3ba","https://github.com/ImageMagick/ImageMagick/compare/7.0.8-41...7.0.8-42","https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830","https://github.com/ImageMagick/ImageMagick6/issues/43"],"published_time":"2019-08-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14981","summary":"In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00665,"ranking_epss":0.71261,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc","https://github.com/ImageMagick/ImageMagick/issues/1552","https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256","https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html","https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc","https://github.com/ImageMagick/ImageMagick/issues/1552","https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256","https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html","https://usn.ubuntu.com/4192-1/","https://www.debian.org/security/2020/dsa-4712"],"published_time":"2019-08-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11041","summary":"When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.03272,"ranking_epss":0.87185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html","http://seclists.org/fulldisclosure/2019/Oct/15","http://seclists.org/fulldisclosure/2019/Oct/55","https://access.redhat.com/errata/RHSA-2019:3299","https://bugs.php.net/bug.php?id=78222","https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html","https://seclists.org/bugtraq/2019/Oct/9","https://seclists.org/bugtraq/2019/Sep/35","https://seclists.org/bugtraq/2019/Sep/38","https://security.netapp.com/advisory/ntap-20190822-0003/","https://support.apple.com/kb/HT210634","https://support.apple.com/kb/HT210722","https://usn.ubuntu.com/4097-1/","https://usn.ubuntu.com/4097-2/","https://www.debian.org/security/2019/dsa-4527","https://www.debian.org/security/2019/dsa-4529","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html","http://seclists.org/fulldisclosure/2019/Oct/15","http://seclists.org/fulldisclosure/2019/Oct/55","https://access.redhat.com/errata/RHSA-2019:3299","https://bugs.php.net/bug.php?id=78222","https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html","https://seclists.org/bugtraq/2019/Oct/9","https://seclists.org/bugtraq/2019/Sep/35","https://seclists.org/bugtraq/2019/Sep/38","https://security.netapp.com/advisory/ntap-20190822-0003/","https://support.apple.com/kb/HT210634","https://support.apple.com/kb/HT210722","https://usn.ubuntu.com/4097-1/","https://usn.ubuntu.com/4097-2/","https://www.debian.org/security/2019/dsa-4527","https://www.debian.org/security/2019/dsa-4529","https://www.tenable.com/security/tns-2021-14"],"published_time":"2019-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-11042","summary":"When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.","cvss":4.8,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":4.8,"cvss_v4":null,"epss":0.03882,"ranking_epss":0.88259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html","http://seclists.org/fulldisclosure/2019/Oct/15","http://seclists.org/fulldisclosure/2019/Oct/55","https://access.redhat.com/errata/RHSA-2019:3299","https://bugs.php.net/bug.php?id=78256","https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html","https://seclists.org/bugtraq/2019/Oct/9","https://seclists.org/bugtraq/2019/Sep/35","https://seclists.org/bugtraq/2019/Sep/38","https://security.netapp.com/advisory/ntap-20190822-0003/","https://support.apple.com/kb/HT210634","https://support.apple.com/kb/HT210722","https://usn.ubuntu.com/4097-1/","https://usn.ubuntu.com/4097-2/","https://www.debian.org/security/2019/dsa-4527","https://www.debian.org/security/2019/dsa-4529","https://www.tenable.com/security/tns-2021-14","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html","http://seclists.org/fulldisclosure/2019/Oct/15","http://seclists.org/fulldisclosure/2019/Oct/55","https://access.redhat.com/errata/RHSA-2019:3299","https://bugs.php.net/bug.php?id=78256","https://lists.debian.org/debian-lts-announce/2019/08/msg00010.html","https://seclists.org/bugtraq/2019/Oct/9","https://seclists.org/bugtraq/2019/Sep/35","https://seclists.org/bugtraq/2019/Sep/38","https://security.netapp.com/advisory/ntap-20190822-0003/","https://support.apple.com/kb/HT210634","https://support.apple.com/kb/HT210722","https://usn.ubuntu.com/4097-1/","https://usn.ubuntu.com/4097-2/","https://www.debian.org/security/2019/dsa-4527","https://www.debian.org/security/2019/dsa-4529","https://www.tenable.com/security/tns-2021-14"],"published_time":"2019-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14806","summary":"Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00264,"ranking_epss":0.4979,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html","https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168","https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246","https://palletsprojects.com/blog/werkzeug-0-15-3-released/","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html","http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html","https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168","https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246","https://palletsprojects.com/blog/werkzeug-0-15-3-released/"],"published_time":"2019-08-09T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-13106","summary":"Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.","cvss":7.8,"cvss_version":3.0,"cvss_v2":8.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00845,"ranking_epss":0.74826,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html","https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75","https://github.com/u-boot/u-boot/commits/master","https://lists.denx.de/pipermail/u-boot/2019-July/375516.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html","https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75","https://github.com/u-boot/u-boot/commits/master","https://lists.denx.de/pipermail/u-boot/2019-July/375516.html"],"published_time":"2019-08-06T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-13104","summary":"In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0029,"ranking_epss":0.52475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html","https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75","https://github.com/u-boot/u-boot/commits/master","https://lists.denx.de/pipermail/u-boot/2019-July/375514.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html","http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html","https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75","https://github.com/u-boot/u-boot/commits/master","https://lists.denx.de/pipermail/u-boot/2019-July/375514.html"],"published_time":"2019-08-06T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14235","summary":"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04511,"ranking_epss":0.89156,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html","https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/","https://seclists.org/bugtraq/2019/Aug/15","https://security.gentoo.org/glsa/202004-17","https://security.netapp.com/advisory/ntap-20190828-0002/","https://www.debian.org/security/2019/dsa-4498","https://www.djangoproject.com/weblog/2019/aug/01/security-releases/","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html","https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/","https://seclists.org/bugtraq/2019/Aug/15","https://security.gentoo.org/glsa/202004-17","https://security.netapp.com/advisory/ntap-20190828-0002/","https://www.debian.org/security/2019/dsa-4498","https://www.djangoproject.com/weblog/2019/aug/01/security-releases/"],"published_time":"2019-08-02T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14232","summary":"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03026,"ranking_epss":0.86665,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html","http://www.openwall.com/lists/oss-security/2023/10/04/6","http://www.openwall.com/lists/oss-security/2024/03/04/1","https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/","https://seclists.org/bugtraq/2019/Aug/15","https://security.gentoo.org/glsa/202004-17","https://security.netapp.com/advisory/ntap-20190828-0002/","https://www.debian.org/security/2019/dsa-4498","https://www.djangoproject.com/weblog/2019/aug/01/security-releases/","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html","http://www.openwall.com/lists/oss-security/2023/10/04/6","http://www.openwall.com/lists/oss-security/2024/03/04/1","https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/","https://seclists.org/bugtraq/2019/Aug/15","https://security.gentoo.org/glsa/202004-17","https://security.netapp.com/advisory/ntap-20190828-0002/","https://www.debian.org/security/2019/dsa-4498","https://www.djangoproject.com/weblog/2019/aug/01/security-releases/"],"published_time":"2019-08-02T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14233","summary":"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04511,"ranking_epss":0.89156,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html","https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/","https://seclists.org/bugtraq/2019/Aug/15","https://security.gentoo.org/glsa/202004-17","https://security.netapp.com/advisory/ntap-20190828-0002/","https://www.debian.org/security/2019/dsa-4498","https://www.djangoproject.com/weblog/2019/aug/01/security-releases/","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html","https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/","https://seclists.org/bugtraq/2019/Aug/15","https://security.gentoo.org/glsa/202004-17","https://security.netapp.com/advisory/ntap-20190828-0002/","https://www.debian.org/security/2019/dsa-4498","https://www.djangoproject.com/weblog/2019/aug/01/security-releases/"],"published_time":"2019-08-02T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2019-14524","summary":"An issue was discovered in Schism Tracker through 20190722. There is a heap-based buffer overflow via a large number of song patterns in fmt_mtm_load_song in fmt/mtm.c, a different vulnerability than CVE-2019-14465.","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.65817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00083.html","https://github.com/schismtracker/schismtracker/issues/201","https://github.com/schismtracker/schismtracker/releases/tag/20190805","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00083.html","https://github.com/schismtracker/schismtracker/issues/201","https://github.com/schismtracker/schismtracker/releases/tag/20190805"],"published_time":"2019-08-02T12:15:12","vendor":null,"product":null,"version":null}]}