CVE-2020-15250
Published at:
-
12-10-2020 08:15
Last modified:
-
12-05-2022 04:43
Total changes:
-
13
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
None
Availability
High
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
Required
User interaction
5.5
Base score
1.8
3.6
Exploitability score
Impact score
Verification logic
Reference
- https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae
- https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md
- https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html
- [creadur-dev] 20201013 [jira] [Created] (RAT-277) Update junit in all Creadur projects in order to fix CVE-2020-15250 (Low severity)-Mailing List, Third Party Advisory
- [creadur-dev] 20201014 [jira] [Assigned] (RAT-277) Update junit in all Creadur projects in order to fix CVE-2020-15250 (Low severity)-Mailing List, Third Party Advisory
- [creadur-commits] 20201014 [creadur-whisker] branch master updated: Update junit to fix CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [creadur-commits] 20201014 [creadur-tentacles] branch master updated: Update junit to fix CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [creadur-commits] 20201014 [creadur-rat] 01/02: RAT-277: Update junit to fix CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [creadur-dev] 20201014 [jira] [Updated] (RAT-277) Update junit in all Creadur projects in order to fix CVE-2020-15250 (Low severity)-Mailing List, Patch, Third Party Advisory
- [creadur-dev] 20201014 [jira] [Closed] (RAT-277) Update junit in all Creadur projects in order to fix CVE-2020-15250 (Low severity)-Mailing List, Third Party Advisory
- [creadur-dev] 20201014 [jira] [Commented] (RAT-277) Update junit in all Creadur projects in order to fix CVE-2020-15250 (Low severity)-Mailing List, Patch, Third Party Advisory
- https://github.com/junit-team/junit4/issues/1676
- [debian-lts-announce] 20201101 [SECURITY] [DLA 2426-1] junit4 security update-Mailing List, Third Party Advisory
- [pdfbox-dev] 20201115 ossindex-maven-plugin and build issue-Mailing List, Third Party Advisory
- [turbine-commits] 20210203 svn commit: r1886168 - in /turbine/core/trunk: ./ conf/ conf/test/ src/java/org/apache/turbine/services/urlmapper/ src/test/org/apache/turbine/services/urlmapper/ src/test/org/apache/turbine/services/urlmapper/model/ xdocs/howto/-Mailing List, Patch, Third Party Advisory
- [pulsar-commits] 20210406 [GitHub] [pulsar] lhotari opened a new pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Patch, Third Party Advisory
- [pulsar-commits] 20210413 [GitHub] [pulsar] lhotari commented on pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210413 [GitHub] [pulsar] lhotari removed a comment on pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210414 [GitHub] [pulsar] lhotari commented on pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210414 [GitHub] [pulsar] lhotari removed a comment on pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210415 [GitHub] [pulsar] lhotari commented on pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210415 [GitHub] [pulsar] lhotari removed a comment on pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210415 [GitHub] [pulsar] eolivelli merged pull request #10147: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak-Mailing List, Third Party Advisory
- [pulsar-commits] 20210415 [pulsar] branch master updated: [Security] Upgrade junit version to 4.13.1 to resolve CVE-2020-15250 and fix test dependency leak (#10147)-Mailing List, Patch, Third Party Advisory
- [creadur-commits] 20210621 [creadur-rat] 02/13: RAT-277: Update junit to fix CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-790) Upgrade to JUnit 4.13.1 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-790 Upgrade to JUnit 4.13.1 due to CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-790) Upgrade to JUnit 4.13.1 due to CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [knox-dev] 20211004 [jira] [Work logged] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-dev] 20211004 [jira] [Created] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-dev] 20211004 [GitHub] [knox] zeroflag opened a new pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-dev] 20211004 [GitHub] [knox] zeroflag commented on pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-dev] 20211008 [jira] [Resolved] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-dev] 20211008 [jira] [Commented] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Patch, Third Party Advisory
- [knox-dev] 20211008 [jira] [Work logged] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-dev] 20211008 [GitHub] [knox] smolnar82 merged pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250-Mailing List, Third Party Advisory
- [knox-commits] 20211008 [knox] branch master updated: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250 (#505)-Mailing List, Patch, Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.html
Keywords