http://www.nessus.org/u?d6c66ac7
http://www.nessus.org/u?c935f269
http://www.nessus.org/u?5736c86e
http://www.openwall.com/lists/oss-security/2020/05/19/6
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
http://www.nessus.org/u?db60dae0
http://www.nessus.org/u?be684a8e
http://www.nessus.org/u?d05a7fce
http://www.nessus.org/u?046ad67b
https://security-tracker.debian.org/tracker/CVE-2020-12888
https://security.netapp.com/advisory/ntap-20200608-0001/
Severity: Medium
ID: 288199
File Name: unity_linux_UTSA-2026-004355.nasl
Version: 1.2
Type: local
Published: 1/16/2026
Updated: 1/16/2026
Supported Sensors: Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.7
Temporal Score: 3.5
Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2020-12888
Risk Factor: Medium
Base Score: 5.3
Temporal Score: 4.6
Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Required KB Items: Host/local_checks_enabled, Host/UOS-Server/release, Host/UOS-Server/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 1/16/2026
Vulnerability Publication Date: 5/15/2020
CVE: CVE-2020-12888