Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:unisys:algol_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1138B08-AE17-435E-9CD1-7F9ED07914FB", "versionEndExcluding": "58.1a.15", "versionStartIncluding": "58.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:unisys:algol_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "654B0A49-8679-427A-B721-81F187FE7020", "versionEndExcluding": "59.1a.9", "versionStartIncluding": "59.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:unisys:algol_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E9F7BE-0A00-49EC-80DF-94D5FAECFCAA", "versionEndExcluding": "60.0a.5", "versionStartIncluding": "60.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Unisys ALGOL Compiler 58.1 before 58.1a.15, 59.1 before 59.1a.9, and 60.0 before 60.0a.5 can emit invalid code sequences under rare circumstances related to syntax. The resulting code could, for example, trigger a system fault or adversely affect confidentiality, integrity, and availability."}, {"lang": "es", "value": "Unisys ALGOL Compiler versiones 58.1 anteriores a 58.1a.15, versiones 59.1 anteriores a 59.1a.9, y versiones 60.0 anteriores a 60.0a.5, permite a usuarios locales desencadenar un fallo del sistema al ejecutar un c\u00f3digo compilado, o afectar negativamente a la confidencialidad, integridad y disponibilidad, por medio de una sintaxis dise\u00f1ada."}], "id": "CVE-2020-12647", "lastModified": "2024-11-21T04:59:58.907", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-05-21T03:15:12.853", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}