ID

VAR-202102-0421


CVE

CVE-2020-35498


TITLE

openvswitch  Resource Depletion Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-016051

DESCRIPTION

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. openvswitch Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202311-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Open vSwitch: Multiple Vulnerabilities Date: November 26, 2023 Bugs: #765346, #769995, #803107, #887561 ID: 202311-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple denial of service vulnerabilites have been found in Open vSwitch. Background ========= Open vSwitch is a production quality multilayer virtual switch. Affected packages ================ Package Vulnerable Unaffected -------------------- ------------ ------------ net-misc/openvswitch < 2.17.6 >= 2.17.6 Description ========== Multiple vulnerabilities have been discovered in Open vSwitch. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Open vSwitch users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openvswitch-2.17.6" References ========= [ 1 ] CVE-2020-27827 https://nvd.nist.gov/vuln/detail/CVE-2020-27827 [ 2 ] CVE-2020-35498 https://nvd.nist.gov/vuln/detail/CVE-2020-35498 [ 3 ] CVE-2021-3905 https://nvd.nist.gov/vuln/detail/CVE-2021-3905 [ 4 ] CVE-2021-36980 https://nvd.nist.gov/vuln/detail/CVE-2021-36980 [ 5 ] CVE-2022-4337 https://nvd.nist.gov/vuln/detail/CVE-2022-4337 [ 6 ] CVE-2022-4338 https://nvd.nist.gov/vuln/detail/CVE-2022-4338 [ 7 ] CVE-2023-1668 https://nvd.nist.gov/vuln/detail/CVE-2023-1668 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202311-16 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: openvswitch2.13 security and bug fix update Advisory ID: RHSA-2021:0497-01 Product: Fast Datapath Advisory URL: https://access.redhat.com/errata/RHSA-2021:0497 Issue date: 2021-02-11 CVE Names: CVE-2020-27827 CVE-2020-35498 ==================================================================== 1. Summary: An update for openvswitch2.13 is now available for Fast Datapath for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Fast Datapath for Red Hat Enterprise Linux 8 - noarch, ppc64le, s390x, x86_64 3. Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es): * openvswitch: limitation in the OVS packet parsing in userspace leads to DoS (CVE-2020-35498) * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [RFE] Add auto load balance params (BZ#1920121) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Fast Datapath for Red Hat Enterprise Linux 8: Source: openvswitch2.13-2.13.0-79.5.el8fdp.src.rpm noarch: openvswitch2.13-test-2.13.0-79.5.el8fdp.noarch.rpm ppc64le: network-scripts-openvswitch2.13-2.13.0-79.5.el8fdp.ppc64le.rpm openvswitch2.13-2.13.0-79.5.el8fdp.ppc64le.rpm openvswitch2.13-debuginfo-2.13.0-79.5.el8fdp.ppc64le.rpm openvswitch2.13-debugsource-2.13.0-79.5.el8fdp.ppc64le.rpm openvswitch2.13-devel-2.13.0-79.5.el8fdp.ppc64le.rpm openvswitch2.13-ipsec-2.13.0-79.5.el8fdp.ppc64le.rpm python3-openvswitch2.13-2.13.0-79.5.el8fdp.ppc64le.rpm python3-openvswitch2.13-debuginfo-2.13.0-79.5.el8fdp.ppc64le.rpm s390x: network-scripts-openvswitch2.13-2.13.0-79.5.el8fdp.s390x.rpm openvswitch2.13-2.13.0-79.5.el8fdp.s390x.rpm openvswitch2.13-debuginfo-2.13.0-79.5.el8fdp.s390x.rpm openvswitch2.13-debugsource-2.13.0-79.5.el8fdp.s390x.rpm openvswitch2.13-devel-2.13.0-79.5.el8fdp.s390x.rpm openvswitch2.13-ipsec-2.13.0-79.5.el8fdp.s390x.rpm python3-openvswitch2.13-2.13.0-79.5.el8fdp.s390x.rpm python3-openvswitch2.13-debuginfo-2.13.0-79.5.el8fdp.s390x.rpm x86_64: network-scripts-openvswitch2.13-2.13.0-79.5.el8fdp.x86_64.rpm openvswitch2.13-2.13.0-79.5.el8fdp.x86_64.rpm openvswitch2.13-debuginfo-2.13.0-79.5.el8fdp.x86_64.rpm openvswitch2.13-debugsource-2.13.0-79.5.el8fdp.x86_64.rpm openvswitch2.13-devel-2.13.0-79.5.el8fdp.x86_64.rpm openvswitch2.13-ipsec-2.13.0-79.5.el8fdp.x86_64.rpm python3-openvswitch2.13-2.13.0-79.5.el8fdp.x86_64.rpm python3-openvswitch2.13-debuginfo-2.13.0-79.5.el8fdp.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-27827 https://access.redhat.com/security/cve/CVE-2020-35498 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYCVE3tzjgjWX9erEAQjlbRAAh5Slg/QVFTU53ML6CncaA+riK8TrgXRc hAr83XSmT63uLXAvmBS7SJgCDadUSCaDdluKkkGGSsBetQSqbN2SiVBNMiriX5jX M0WWEDkbELosJbryqYCGYi48vfU1QGRZN4pjagfpF4upkC9wS8ikonOBBmw9GpoM YEns5AQcHbL2r3tKe4ViLOQvl7xB41F+B1eXndqmH6tuq3JuRbG1cUk3BTCH/t84 D4vIQZ6WqP9MJi0wxsNtLtT2fTJyOjr82WpphHUiv5oNhD5fMYxyThnRk1Roxbv/ qcdx+pJFrtBNTY+iKooBVBqp7eTanEZeYd1bA5B+h5EuxsAOH4+HnQfDfApp4RSP 5ycEbzeCCv3RtFYqGGUUYnqhz6/hEHRQ+JKcC8ABabwENTnUHjPbW5LHNF+n3fEX t1NLKrnegxrvR9l8inSc+ihoRYbOzyFAZaug19fzvGVdF0E3bOniIXAf0hduX5op UogT6xLOr2dkFXOMFXagDw3ZAy9mw+x/PlOyDMxdNXczt/ElUmUfRhO5S4Tn3f4X BrUSULdnJhp0BOP/8ByfQGWAN8q1SzaK3WnN2l7Wlv07ls+6GhelvVAFaNKGJm8j JyjNpBQPcwTKU/WBe48VgFHNEwBsdgjoC8Wz6lOnz4aCIXnCrVMFwMYfKjsEQHla deAmlUbWHbU\xa2Bq -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4729-1 February 10, 2021 openvswitch vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Open vSwitch could be made to crash or perform unexpectedly if it received specially crafted network traffic. Software Description: - openvswitch: Ethernet virtual switch Details: Joakim Hindersson discovered that Open vSwitch incorrectly parsed certain network packets. A remote attacker could use this issue to cause a denial of service, or possibly alter packet classification. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: openvswitch-common 2.13.1-0ubuntu1.3 Ubuntu 20.04 LTS: openvswitch-common 2.13.1-0ubuntu0.20.04.4 Ubuntu 18.04 LTS: openvswitch-common 2.9.8-0ubuntu0.18.04.2 Ubuntu 16.04 LTS: openvswitch-common 2.5.9-0ubuntu0.16.04.3 In general, a standard system update will make all the necessary changes

Trust: 2.43

sources: NVD: CVE-2020-35498 // JVNDB: JVNDB-2020-016051 // VULHUB: VHN-377694 // PACKETSTORM: 175917 // PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161789 // PACKETSTORM: 161785 // PACKETSTORM: 161369 // PACKETSTORM: 161781

AFFECTED PRODUCTS

vendor:openvswitchmodel:openvswitchscope:gteversion:2.14.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.14.2

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.11.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.5.12

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.12.3

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.8.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.10.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.12.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.9.9

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.5.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.7.13

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.9.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.11.6

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.8.11

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.6.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.13.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.13.3

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.10.7

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.7.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.6.10

Trust: 1.0

vendor:open vswitchmodel:open vswitchscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-016051 // NVD: CVE-2020-35498

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35498
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2020-35498
value: HIGH

Trust: 1.0

NVD: CVE-2020-35498
value: HIGH

Trust: 0.8

VULHUB: VHN-377694
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-35498
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-377694
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-35498
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2020-35498
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-377694 // JVNDB: JVNDB-2020-016051 // NVD: CVE-2020-35498 // NVD: CVE-2020-35498

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:Resource exhaustion (CWE-400) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-377694 // JVNDB: JVNDB-2020-016051 // NVD: CVE-2020-35498

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161789 // PACKETSTORM: 161785 // PACKETSTORM: 161369 // PACKETSTORM: 161781

TYPE

memory leak

Trust: 0.5

sources: PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161789 // PACKETSTORM: 161785 // PACKETSTORM: 161781

PATCH

title:Support extra padding length.url:https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html

Trust: 0.8

sources: JVNDB: JVNDB-2020-016051

EXTERNAL IDS

db:NVDid:CVE-2020-35498

Trust: 2.7

db:OPENWALLid:OSS-SECURITY/2021/02/10/4

Trust: 1.1

db:JVNDBid:JVNDB-2020-016051

Trust: 0.8

db:PACKETSTORMid:161369

Trust: 0.2

db:PACKETSTORMid:162733

Trust: 0.2

db:PACKETSTORMid:161781

Trust: 0.2

db:PACKETSTORMid:163180

Trust: 0.2

db:PACKETSTORMid:161391

Trust: 0.2

db:PACKETSTORMid:161789

Trust: 0.2

db:PACKETSTORMid:161785

Trust: 0.2

db:PACKETSTORMid:162044

Trust: 0.1

db:PACKETSTORMid:162017

Trust: 0.1

db:VULHUBid:VHN-377694

Trust: 0.1

db:PACKETSTORMid:175917

Trust: 0.1

sources: VULHUB: VHN-377694 // PACKETSTORM: 175917 // PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161789 // PACKETSTORM: 161785 // PACKETSTORM: 161369 // PACKETSTORM: 161781 // JVNDB: JVNDB-2020-016051 // NVD: CVE-2020-35498

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1908845

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2020-35498

Trust: 1.6

url:https://www.debian.org/security/2021/dsa-4852

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2021/02/10/4

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html

Trust: 1.1

url:https://security.gentoo.org/glsa/202311-16

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/uj4dxfjwmz325eczxpzosk7boedjzhpr/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-27827

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-35498

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-27827

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/uj4dxfjwmz325eczxpzosk7boedjzhpr/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3905

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4337

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1668

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-36980

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8011

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8011

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2077

Trust: 0.1

url:https://access.redhat.com/security/updates/classification#important

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2456

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0497

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0835

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0837

Trust: 0.1

url:https://usn.ubuntu.com/4729-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.13.1-0ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.13.1-0ubuntu0.20.04.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.5.9-0ubuntu0.16.04.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.9.8-0ubuntu0.18.04.2

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0834

Trust: 0.1

sources: VULHUB: VHN-377694 // PACKETSTORM: 175917 // PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161789 // PACKETSTORM: 161785 // PACKETSTORM: 161369 // PACKETSTORM: 161781 // JVNDB: JVNDB-2020-016051 // NVD: CVE-2020-35498

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161789 // PACKETSTORM: 161785 // PACKETSTORM: 161781

SOURCES

db:VULHUBid:VHN-377694
db:PACKETSTORMid:175917
db:PACKETSTORMid:162733
db:PACKETSTORMid:163180
db:PACKETSTORMid:161391
db:PACKETSTORMid:161789
db:PACKETSTORMid:161785
db:PACKETSTORMid:161369
db:PACKETSTORMid:161781
db:JVNDBid:JVNDB-2020-016051
db:NVDid:CVE-2020-35498

LAST UPDATE DATE

2026-04-18T22:48:43.726000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-377694date:2021-03-17T00:00:00
db:JVNDBid:JVNDB-2020-016051date:2021-11-02T08:58:00
db:NVDid:CVE-2020-35498date:2025-04-23T20:15:20

SOURCES RELEASE DATE

db:VULHUBid:VHN-377694date:2021-02-11T00:00:00
db:PACKETSTORMid:175917date:2023-11-27T15:42:18
db:PACKETSTORMid:162733date:2021-05-20T22:17:24
db:PACKETSTORMid:163180date:2021-06-17T17:37:26
db:PACKETSTORMid:161391date:2021-02-11T15:26:10
db:PACKETSTORMid:161789date:2021-03-15T20:30:52
db:PACKETSTORMid:161785date:2021-03-15T19:01:34
db:PACKETSTORMid:161369date:2021-02-11T15:14:59
db:PACKETSTORMid:161781date:2021-03-15T17:26:06
db:JVNDBid:JVNDB-2020-016051date:2021-11-02T00:00:00
db:NVDid:CVE-2020-35498date:2021-02-11T18:15:15.677