Search for vulnerabilities
Vulnerability details: VCID-11eh-7mhp-aaab
Vulnerability ID VCID-11eh-7mhp-aaab
Aliases CVE-2020-14779
Summary
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14779.html
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4305
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4306
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4307
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4316
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4347
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4348
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4349
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4350
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4352
rhas Important https://access.redhat.com/errata/RHSA-2020:5585
rhas Moderate https://access.redhat.com/errata/RHSA-2020:5586
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0530
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2020-14779
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1889271
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
cvssv3.1 3.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
generic_textual Medium https://ubuntu.com/security/notices/USN-4607-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4607-2
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14779.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
https://api.first.org/data/v1/epss?cve=CVE-2020-14779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.oracle.com/security-alerts/cpuoct2020.html
1889271 https://bugzilla.redhat.com/show_bug.cgi?id=1889271
GLSA-202409-26 https://security.gentoo.org/glsa/202409-26
N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
RHSA-2020:4305 https://access.redhat.com/errata/RHSA-2020:4305
RHSA-2020:4306 https://access.redhat.com/errata/RHSA-2020:4306
RHSA-2020:4307 https://access.redhat.com/errata/RHSA-2020:4307
RHSA-2020:4316 https://access.redhat.com/errata/RHSA-2020:4316
RHSA-2020:4347 https://access.redhat.com/errata/RHSA-2020:4347
RHSA-2020:4348 https://access.redhat.com/errata/RHSA-2020:4348
RHSA-2020:4349 https://access.redhat.com/errata/RHSA-2020:4349
RHSA-2020:4350 https://access.redhat.com/errata/RHSA-2020:4350
RHSA-2020:4352 https://access.redhat.com/errata/RHSA-2020:4352
RHSA-2020:5585 https://access.redhat.com/errata/RHSA-2020:5585
RHSA-2020:5586 https://access.redhat.com/errata/RHSA-2020:5586
RHSA-2021:0530 https://access.redhat.com/errata/RHSA-2021:0530
USN-4607-1 https://usn.ubuntu.com/4607-1/
USN-4607-2 https://usn.ubuntu.com/4607-2/
XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.34911
EPSS Score 0.00138
Published At May 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.