Search for vulnerabilities
Vulnerability details: VCID-5n9r-4ra2-aaar
Vulnerability ID VCID-5n9r-4ra2-aaar
Aliases CVE-2020-9281
GHSA-vcjf-mgcg-jxjq
Summary Cross-site Scripting A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor allows remote attackers to inject arbitrary web script through a crafted `protected` comment (with the `cke_protected` syntax).
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00163 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00231 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00231 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00231 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00231 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00506 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00506 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00506 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00625 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00952 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00952 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00952 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00952 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.00971 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01212 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
epss 0.01216 https://api.first.org/data/v1/epss?cve=CVE-2020-9281
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-vcjf-mgcg-jxjq
cvssv3.1 3.1 https://github.com/ckeditor/ckeditor4
generic_textual LOW https://github.com/ckeditor/ckeditor4
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2020-9281
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-9281
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-9281
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpuApr2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuApr2021.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2021.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2021.html
cvssv3.1 6.6 https://www.oracle.com/security-alerts/cpujan2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpujan2022.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuoct2021.html
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2020-9281
https://github.com/ckeditor/ckeditor4
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
cpe:2.3:a:ckeditor:ckeditor:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ckeditor:ckeditor:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_management:2.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_management:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_managment:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_managment:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_managment:2.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_managment:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_managment:2.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_managment:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_managment:2.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_managment:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_managment:2.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_managment:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_managment:2.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_default_managment:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:siebel_apps_-_customer_order_management:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:siebel_apps_-_customer_order_management:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:11.1.1.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:webcenter_portal:11.1.1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
CVE-2020-9281 https://nvd.nist.gov/vuln/detail/CVE-2020-9281
GHSA-vcjf-mgcg-jxjq https://github.com/advisories/GHSA-vcjf-mgcg-jxjq
USN-5340-1 https://usn.ubuntu.com/5340-1/
USN-USN-5340-2 https://usn.ubuntu.com/USN-5340-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N Found at https://github.com/ckeditor/ckeditor4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-9281
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-9281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-9281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuApr2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.53693
EPSS Score 0.00163
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.