Search for vulnerabilities
Vulnerability details: VCID-zrah-xa2u-aaan
Vulnerability ID VCID-zrah-xa2u-aaan
Aliases BIT-2020-13596
BIT-django-2020-13596
CVE-2020-13596
GHSA-2m34-jcjv-45xf
PYSEC-2020-32
Summary An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-13596.html
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13596.json
epss 0.00160 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.00160 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.00160 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.00160 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.0108 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
epss 0.03209 https://api.first.org/data/v1/epss?cve=CVE-2020-13596
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1843625
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13254
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13596
cvssv3.1 8.8 https://docs.djangoproject.com/en/3.0/releases/security
generic_textual HIGH https://docs.djangoproject.com/en/3.0/releases/security
cvssv3.1 6.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-2m34-jcjv-45xf
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 6.1 https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
generic_textual MODERATE https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
cvssv3.1 6.1 https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815
generic_textual MODERATE https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815
cvssv3.1 6.1 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-32.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-32.yaml
cvssv3.1 6.1 https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
generic_textual MODERATE https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2020-13596
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-13596
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-13596
archlinux Medium https://security.archlinux.org/AVG-1176
cvssv3.1 6.1 https://security.netapp.com/advisory/ntap-20200611-0002
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20200611-0002
generic_textual Medium https://ubuntu.com/security/notices/USN-4381-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4381-2
cvssv3.1 6.1 https://usn.ubuntu.com/4381-1
generic_textual MODERATE https://usn.ubuntu.com/4381-1
cvssv3.1 6.1 https://usn.ubuntu.com/4381-2
generic_textual MODERATE https://usn.ubuntu.com/4381-2
generic_textual Medium https://usn.ubuntu.com/usn/usn-4381-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4381-2
cvssv3.1 8.8 https://www.debian.org/security/2020/dsa-4705
generic_textual HIGH https://www.debian.org/security/2020/dsa-4705
cvssv3.1 6.1 https://www.djangoproject.com/weblog/2020/jun/03/security-releases
generic_textual MODERATE https://www.djangoproject.com/weblog/2020/jun/03/security-releases
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2021.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2021.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-13596.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13596.json
https://api.first.org/data/v1/epss?cve=CVE-2020-13596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13596
https://docs.djangoproject.com/en/3.0/releases/security
https://docs.djangoproject.com/en/3.0/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-32.yaml
https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
https://security.netapp.com/advisory/ntap-20200611-0002
https://security.netapp.com/advisory/ntap-20200611-0002/
https://ubuntu.com/security/notices/USN-4381-1
https://ubuntu.com/security/notices/USN-4381-2
https://usn.ubuntu.com/4381-1
https://usn.ubuntu.com/4381-1/
https://usn.ubuntu.com/4381-2
https://usn.ubuntu.com/4381-2/
https://usn.ubuntu.com/usn/usn-4381-1
https://usn.ubuntu.com/usn/usn-4381-2
https://www.debian.org/security/2020/dsa-4705
https://www.djangoproject.com/weblog/2020/jun/03/security-releases
https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
https://www.oracle.com/security-alerts/cpujan2021.html
1843625 https://bugzilla.redhat.com/show_bug.cgi?id=1843625
962323 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962323
ASA-202006-8 https://security.archlinux.org/ASA-202006-8
AVG-1176 https://security.archlinux.org/AVG-1176
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
CVE-2020-13596 https://nvd.nist.gov/vuln/detail/CVE-2020-13596
GHSA-2m34-jcjv-45xf https://github.com/advisories/GHSA-2m34-jcjv-45xf
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13596.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://docs.djangoproject.com/en/3.0/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-32.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-13596
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-13596
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-13596
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20200611-0002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://usn.ubuntu.com/4381-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://usn.ubuntu.com/4381-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2020/dsa-4705
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.djangoproject.com/weblog/2020/jun/03/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.52957
EPSS Score 0.00160
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.