{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T06:37:50.683","vulnerabilities":[{"cve":{"id":"CVE-2020-14577","sourceIdentifier":"secalert_us@oracle.com","published":"2020-07-15T18:15:23.753","lastModified":"2025-05-27T16:37:10.247","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)."},{"lang":"es","value":"Vulnerabilidad en el producto Java SE, Java SE Embedded de Oracle Java SE (componente: JSSE). Las versiones compatibles que están afectadas son Java SE: 7u261, 8u251, 11.0.7 y 14.0.1; Java SE Embedded: 8u251. La vulnerabilidad difícil de explotar permite a un atacante no autenticado con acceso de red por medio de TLS comprometer a Java SE, Java SE Embedded. Los ataques con éxito de esta vulnerabilidad pueden resultar en un acceso de lectura no autorizado a un subconjunto de datos accesibles de Java SE, Java SE Embedded. Nota: Aplica a la implementación del cliente y el servidor de Java. Esta vulnerabilidad puede ser explotada por medio de aplicaciones Java Web Start en sandbox y applets de Java en sandbox. También puede ser explotada mediante el suministro de datos a las API en el Componente especificado sin utilizar aplicaciones de Java Web Start en sandbox o applets de Java en sandbox, como por medio de un servicio web. CVSS 3.1 Puntuación Base 3.7 (Impactos de la Confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)"}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","matchCriteriaId":"E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","matchCriteriaId":"02011EDC-20A7-4A16-A592-7C76E0037997"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","matchCriteriaId":"AC6D4652-1226-4C60-BEDF-01EBF8AC0849"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","matchCriteriaId":"3C1F9ED7-7D93-41F4-9130-15BA734420AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","matchCriteriaId":"1CF9CDF1-95D3-4125-A73F-396D2280FC4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","matchCriteriaId":"A13266DC-F8D9-4F30-987F-65BBEAF8D3A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","matchCriteriaId":"C28388AB-CFC9-4749-A90F-383F5B905EA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","matchCriteriaId":"DA1B00F9-A81C-48B7-8DAA-F394DDF323F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","matchCriteriaId":"CA7AD457-6CE6-4925-8D94-A907B40233D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","matchCriteriaId":"A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","matchCriteriaId":"5480E5AD-DB46-474A-9B57-84ED088A75FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","matchCriteriaId":"881A4AE9-6012-4E91-98BE-0A352CC20703"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","matchCriteriaId":"7E1E1079-57D9-473B-A017-964F4745F329"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","matchCriteriaId":"B8D6446E-2915-4F12-87BE-E7420BC2626E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","matchCriteriaId":"564EDCE3-16E6-401D-8A43-032D1F8875E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","matchCriteriaId":"08278802-D31B-488A-BA6A-EBC816DF883A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","matchCriteriaId":"72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","matchCriteriaId":"7BBB0969-565E-43E2-B067-A10AAA5F1958"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","matchCriteriaId":"D78BE95D-6270-469A-8035-FCDDB398F952"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","matchCriteriaId":"88C24F40-3150-4584-93D9-8307DE04EEE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","matchCriteriaId":"E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","matchCriteriaId":"19626B36-62FC-4497-A2E1-7D6CD9839B19"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","matchCriteriaId":"5713AEBD-35F6-44E8-A0CC-A42830D7AE20"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","matchCriteriaId":"8BE0C04B-440E-4B35-ACC8-6264514F764C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","matchCriteriaId":"555EC2A6-0475-48ED-AE0C-B306714A9333"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","matchCriteriaId":"EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*","matchCriteriaId":"02C55E2E-AEDE-455C-B128-168C918B5D97"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","matchCriteriaId":"70892D06-6E75-4425-BBF0-4B684EC62A1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*","matchCriteriaId":"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*","matchCriteriaId":"7417B2BB-9AC2-4AF4-A828-C89A0735AD92"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*","matchCriteriaId":"6A0A57B5-6F88-4288-9CDE-F6613FE068D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*","matchCriteriaId":"67ED8559-C348-4932-B7CE-CB96976A30EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*","matchCriteriaId":"40AC3D91-263F-4345-9FAA-0E573EA64590"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*","matchCriteriaId":"DD92AFA9-81F8-48D4-B79A-E7F066F69A99"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*","matchCriteriaId":"2C4B2F24-A730-4818-90C8-A2D90C081F03"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*","matchCriteriaId":"464087F2-C285-4574-957E-CE0663F07DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*","matchCriteriaId":"3E9BB880-A4F6-4887-8BB9-47AA298753D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","matchCriteriaId":"18DCFF53-B298-4534-AB5C-8A5EF59C616F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","matchCriteriaId":"083419F8-FDDF-4E36-88F8-857DB317C1D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","matchCriteriaId":"D7A74F65-57E8-4C9A-BA96-5EF401504F13"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","matchCriteriaId":"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","matchCriteriaId":"07812576-3C35-404C-A7D7-9BE9E3D76E00"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","matchCriteriaId":"00C52B1C-5447-4282-9667-9EBE0720B423"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","matchCriteriaId":"92BB9EB0-0C12-4E77-89EE-FB77097841B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","matchCriteriaId":"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","matchCriteriaId":"ABC0E7BB-F8B7-4369-9910-71240E4073A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","matchCriteriaId":"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","matchCriteriaId":"0AE30779-48FB-451E-8CE1-F469F93B8772"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","matchCriteriaId":"60590FDE-7156-4314-A012-AA38BD2ADDC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","matchCriteriaId":"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","matchCriteriaId":"F24F6122-2256-41B6-9033-794C6424ED99"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","matchCriteriaId":"0EAFA79E-8C7A-48CF-8868-11378FE4B26F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","matchCriteriaId":"D1D6F19F-59B5-4BB6-AD35-013384025970"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","matchCriteriaId":"E7BA97BC-3ADA-465A-835B-6C3C5F416B56"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","matchCriteriaId":"B71F77A4-B7EB-47A1-AAFD-431A7D040B86"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","matchCriteriaId":"91D6BEA9-5943-44A4-946D-CEAA9BA99376"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","matchCriteriaId":"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","matchCriteriaId":"2CB74086-14B8-4237-8357-E0C6B5BB8313"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","matchCriteriaId":"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","matchCriteriaId":"00C2B9C9-1177-4DA6-96CE-55F37F383F99"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*","matchCriteriaId":"435CF189-0BD8-40DF-A0DC-99862CDEAF8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","matchCriteriaId":"12A3F367-33AD-47C3-BFDC-871A17E72C94"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*","matchCriteriaId":"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","matchCriteriaId":"78261932-7373-4F16-91E0-1A72ADBEBC3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*","matchCriteriaId":"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","matchCriteriaId":"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*","matchCriteriaId":"F5A40B8A-D428-4008-9F21-AF21394C51D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11:*:*:*:*:*:*:*","matchCriteriaId":"465CFA59-8E94-415A-ACF0-E678826813BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:*","matchCriteriaId":"85BDC28A-484B-4D14-8D68-890450DCE3F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:*","matchCriteriaId":"635DEFDD-4840-48C6-AB1C-ADAFF4A1E50C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:*","matchCriteriaId":"40A221DB-1684-4C87-B576-0969FE13E1AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:*","matchCriteriaId":"DE6A1B86-3688-4A13-AB37-DBD0DA323202"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:*","matchCriteriaId":"17E0085B-4748-4F79-BEF6-CD9C3D2E6FE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.6:*:*:*:*:*:*:*","matchCriteriaId":"3C4DAA76-EAA9-4C85-A92A-181EA49F3270"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:11.0.7:*:*:*:*:*:*:*","matchCriteriaId":"19FC2907-1712-4E81-AC35-E3A15BF27606"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:13:*:*:*:*:*:*:*","matchCriteriaId":"FD3A4AFB-8D76-4B16-A306-2A10F23E51EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1704C904-6E0A-4972-BC94-326D8BC6315A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:13.0.2:*:*:*:*:*:*:*","matchCriteriaId":"35FA24D1-8BDA-4DD4-A74C-C041C44A1455"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:13.0.3:*:*:*:*:*:*:*","matchCriteriaId":"790FD30A-CE27-4A1E-A753-BE0A6B17B262"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","matchCriteriaId":"F46E15B6-86D8-4B16-B3E9-B1CAAA354E7F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update261:*:*:*:*:*:*","matchCriteriaId":"C9F6C698-54CB-4CBE-BBC9-2A059D419BAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.8.0:update251:*:*:*:*:*:*","matchCriteriaId":"FF39F7B1-6571-4BF6-A58F-4A6801636217"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:11.0.7:*:*:*:*:*:*:*","matchCriteriaId":"1A0D065C-C4AB-4558-86C3-9A89C9CADBF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:14.0.1:*:*:*:*:*:*:*","matchCriteriaId":"8D034E25-195A-4926-9FEC-A2B9F01E0CFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update261:*:*:*:*:*:*","matchCriteriaId":"127983EF-72C6-4DCA-923A-8C6D51380A7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.8.0:update251:*:*:*:*:*:*","matchCriteriaId":"D2DD43D4-AF2E-41DF-90C0-F899C624430E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:11.0.7:*:*:*:*:*:*:*","matchCriteriaId":"D3D66586-1585-42B2-8734-40FE8C7E5597"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:14.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3794CCBE-8A61-44F0-99FC-E7C0773A8744"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","matchCriteriaId":"80F0FA5D-8D3B-4C0E-81E2-87998286AF33"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","matchCriteriaId":"36D96259-24BD-44E2-96D9-78CE1D41F956"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","matchCriteriaId":"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","matchCriteriaId":"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","matchCriteriaId":"902B8056-9E37-443B-8905-8AA93E2447FB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","matchCriteriaId":"B620311B-34A3-48A6-82DF-6F078D7A4493"},{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","matchCriteriaId":"B009C22E-30A4-4288-BCF6-C3E81DEAF45A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"DEECE5FC-CACF-4496-A3E7-164736409252"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","matchCriteriaId":"7EF6650C-558D-45C8-AE7D-136EE70CB6D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","versionStartIncluding":"7.3","matchCriteriaId":"BD075607-09B7-493E-8611-66D041FFDA62"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","versionStartIncluding":"9.5","matchCriteriaId":"B64FC591-5854-4480-A6E2-5E953C2415B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","matchCriteriaId":"5C2089EE-5D7F-47EC-8EA5-0F69790564C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","matchCriteriaId":"F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","matchCriteriaId":"24B8DB06-590A-4008-B0AB-FCD1401C77C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndIncluding":"11.70.2","matchCriteriaId":"8C5DA53D-744B-4087-AEA9-257F18949E4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","matchCriteriaId":"1AEFF829-A8F2-4041-8DDF-E705DB3ADED2"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","matchCriteriaId":"F1BE6C1F-2565-4E97-92AA-16563E5660A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","matchCriteriaId":"5735E553-9731-4AAC-BCFF-989377F817B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","matchCriteriaId":"A372B177-F740-4655-865C-31777A6E140B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","matchCriteriaId":"64DE38C8-94F1-4860-B045-F33928F676A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","matchCriteriaId":"25BBBC1A-228F-45A6-AE95-DB915EDF84BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","matchCriteriaId":"E94F7F59-1785-493F-91A7-5F5EA5E87E4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndIncluding":"9.0.4","matchCriteriaId":"D239B58A-9386-443D-B579-B56AE2A500BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","matchCriteriaId":"8ADFF451-740F-4DBA-BD23-3881945D3E40"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","source":"secalert_us@oracle.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","source":"secalert_us@oracle.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","source":"secalert_us@oracle.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","source":"secalert_us@oracle.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/202209-15","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20200717-0005/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://usn.ubuntu.com/4433-1/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://usn.ubuntu.com/4453-1/","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://www.debian.org/security/2020/dsa-4734","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/202209-15","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20200717-0005/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://usn.ubuntu.com/4433-1/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://usn.ubuntu.com/4453-1/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.debian.org/security/2020/dsa-4734","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}