1385 lines
65 KiB
JSON
Raw Normal View History

2024-04-16 14:26:14 +00:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221771",
"Version": "oval:org.altlinux.errata:def:20221771",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1771: package `vim` update to version 8.2.4784-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1771",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1771",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-05417",
"RefURL": "https://bdu.fstec.ru/vul/2021-05417",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05633",
"RefURL": "https://bdu.fstec.ru/vul/2021-05633",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06187",
"RefURL": "https://bdu.fstec.ru/vul/2021-06187",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06188",
"RefURL": "https://bdu.fstec.ru/vul/2021-06188",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06189",
"RefURL": "https://bdu.fstec.ru/vul/2021-06189",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00978",
"RefURL": "https://bdu.fstec.ru/vul/2022-00978",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00979",
"RefURL": "https://bdu.fstec.ru/vul/2022-00979",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00980",
"RefURL": "https://bdu.fstec.ru/vul/2022-00980",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00981",
"RefURL": "https://bdu.fstec.ru/vul/2022-00981",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00982",
"RefURL": "https://bdu.fstec.ru/vul/2022-00982",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00984",
"RefURL": "https://bdu.fstec.ru/vul/2022-00984",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00988",
"RefURL": "https://bdu.fstec.ru/vul/2022-00988",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00989",
"RefURL": "https://bdu.fstec.ru/vul/2022-00989",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00990",
"RefURL": "https://bdu.fstec.ru/vul/2022-00990",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00991",
"RefURL": "https://bdu.fstec.ru/vul/2022-00991",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00992",
"RefURL": "https://bdu.fstec.ru/vul/2022-00992",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00993",
"RefURL": "https://bdu.fstec.ru/vul/2022-00993",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00996",
"RefURL": "https://bdu.fstec.ru/vul/2022-00996",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01014",
"RefURL": "https://bdu.fstec.ru/vul/2022-01014",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01016",
"RefURL": "https://bdu.fstec.ru/vul/2022-01016",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01026",
"RefURL": "https://bdu.fstec.ru/vul/2022-01026",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01055",
"RefURL": "https://bdu.fstec.ru/vul/2022-01055",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01466",
"RefURL": "https://bdu.fstec.ru/vul/2022-01466",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02131",
"RefURL": "https://bdu.fstec.ru/vul/2022-02131",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02375",
"RefURL": "https://bdu.fstec.ru/vul/2022-02375",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02385",
"RefURL": "https://bdu.fstec.ru/vul/2022-02385",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03269",
"RefURL": "https://bdu.fstec.ru/vul/2022-03269",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03270",
"RefURL": "https://bdu.fstec.ru/vul/2022-03270",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03909",
"RefURL": "https://bdu.fstec.ru/vul/2022-03909",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05500",
"RefURL": "https://bdu.fstec.ru/vul/2022-05500",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05501",
"RefURL": "https://bdu.fstec.ru/vul/2022-05501",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05921",
"RefURL": "https://bdu.fstec.ru/vul/2022-05921",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05922",
"RefURL": "https://bdu.fstec.ru/vul/2022-05922",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05924",
"RefURL": "https://bdu.fstec.ru/vul/2022-05924",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05925",
"RefURL": "https://bdu.fstec.ru/vul/2022-05925",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05970",
"RefURL": "https://bdu.fstec.ru/vul/2022-05970",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05977",
"RefURL": "https://bdu.fstec.ru/vul/2022-05977",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05978",
"RefURL": "https://bdu.fstec.ru/vul/2022-05978",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05979",
"RefURL": "https://bdu.fstec.ru/vul/2022-05979",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07168",
"RefURL": "https://bdu.fstec.ru/vul/2022-07168",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07169",
"RefURL": "https://bdu.fstec.ru/vul/2022-07169",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00288",
"RefURL": "https://bdu.fstec.ru/vul/2023-00288",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3770",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3778",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3796",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3872",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3875",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3903",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3927",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3928",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3984",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4019",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4069",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4136",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4173",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4187",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4192",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4193",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0128",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0158",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0318",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0359",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0361",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0392",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0393",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0408",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0413",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0417",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0443",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0554",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0629",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0685",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0696",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0714",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0943",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1381",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1420",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420",
"Source": "CVE"
}
],
"Description": "This update upgrades vim to version 8.2.4784-alt1. \nSecurity Fix(es):\n\n * BDU:2021-05417: Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05633: Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06187: Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2021-06188: Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи\n\n * BDU:2021-06189: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00978: Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00979: Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации\n\n * BDU:2022-00980: Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации\n\n * BDU:2022-00981: Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00982: Уязвимость функции utf_head_off() (mbyte.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00984: Уязвимость компонента spellsuggest.c текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00988: Уязвимость функции init_ccline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00989: Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2022-00990: Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00991: Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызва
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-04-27"
},
"Updated": {
"Date": "2022-04-27"
},
"BDUs": [
{
"ID": "BDU:2021-05417",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"CWE": "CWE-122, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05417",
"Impact": "High",
"Public": "20210911"
},
{
"ID": "BDU:2021-05633",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-05633",
"Impact": "High",
"Public": "20210907"
},
{
"ID": "BDU:2021-06187",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06187",
"Impact": "High",
"Public": "20211121"
},
{
"ID": "BDU:2021-06188",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-06188",
"Impact": "Low",
"Public": "20211121"
},
{
"ID": "BDU:2021-06189",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-06189",
"Impact": "Low",
"Public": "20211121"
},
{
"ID": "BDU:2022-00978",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00978",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "BDU:2022-00979",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00979",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "BDU:2022-00980",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00980",
"Impact": "High",
"Public": "20211231"
},
{
"ID": "BDU:2022-00981",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00981",
"Impact": "High",
"Public": "20211227"
},
{
"ID": "BDU:2022-00982",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00982",
"Impact": "Critical",
"Public": "20220121"
},
{
"ID": "BDU:2022-00984",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00984",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "BDU:2022-00988",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00988",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "BDU:2022-00989",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00989",
"Impact": "High",
"Public": "20211206"
},
{
"ID": "BDU:2022-00990",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00990",
"Impact": "High",
"Public": "20220118"
},
{
"ID": "BDU:2022-00991",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00991",
"Impact": "High",
"Public": "20211219"
},
{
"ID": "BDU:2022-00992",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00992",
"Impact": "High",
"Public": "20220128"
},
{
"ID": "BDU:2022-00993",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00993",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "BDU:2022-00996",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-00996",
"Impact": "High",
"Public": "20210221"
},
{
"ID": "BDU:2022-01014",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01014",
"Impact": "High",
"Public": "20220214"
},
{
"ID": "BDU:2022-01016",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01016",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "BDU:2022-01026",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01026",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "BDU:2022-01055",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-01055",
"Impact": "Low",
"Public": "20220222"
},
{
"ID": "BDU:2022-01466",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01466",
"Impact": "High",
"Public": "20220313"
},
{
"ID": "BDU:2022-02131",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02131",
"Impact": "High",
"Public": "20220329"
},
{
"ID": "BDU:2022-02375",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-02375",
"Impact": "High",
"Public": "20220223"
},
{
"ID": "BDU:2022-02385",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-02385",
"Impact": "High",
"Public": "20220217"
},
{
"ID": "BDU:2022-03269",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"CWE": "CWE-119, CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-03269",
"Impact": "High",
"Public": "20220413"
},
{
"ID": "BDU:2022-03270",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"CWE": "CWE-119, CWE-125, CWE-823",
"Href": "https://bdu.fstec.ru/vul/2022-03270",
"Impact": "Low",
"Public": "20220414"
},
{
"ID": "BDU:2022-03909",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-03909",
"Impact": "High",
"Public": "20220328"
},
{
"ID": "BDU:2022-05500",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05500",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "BDU:2022-05501",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05501",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "BDU:2022-05921",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-457",
"Href": "https://bdu.fstec.ru/vul/2022-05921",
"Impact": "High",
"Public": "20211029"
},
{
"ID": "BDU:2022-05922",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-05922",
"Impact": "High",
"Public": "20211113"
},
{
"ID": "BDU:2022-05924",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05924",
"Impact": "High",
"Public": "20211025"
},
{
"ID": "BDU:2022-05925",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-05925",
"Impact": "High",
"Public": "20220124"
},
{
"ID": "BDU:2022-05970",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-05970",
"Impact": "Low",
"Public": "20211229"
},
{
"ID": "BDU:2022-05977",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-05977",
"Impact": "High",
"Public": "20220129"
},
{
"ID": "BDU:2022-05978",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://bdu.fstec.ru/vul/2022-05978",
"Impact": "High",
"Public": "20220208"
},
{
"ID": "BDU:2022-05979",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://bdu.fstec.ru/vul/2022-05979",
"Impact": "High",
"Public": "20220219"
},
{
"ID": "BDU:2022-07168",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07168",
"Impact": "High",
"Public": "20220131"
},
{
"ID": "BDU:2022-07169",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07169",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "BDU:2023-00288",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-00288",
"Impact": "High",
"Public": "20210903"
}
],
"CVEs": [
{
"ID": "CVE-2021-3770",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
"Impact": "High",
"Public": "20210906"
},
{
"ID": "CVE-2021-3778",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
"Impact": "High",
"Public": "20210915"
},
{
"ID": "CVE-2021-3796",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
"Impact": "High",
"Public": "20210915"
},
{
"ID": "CVE-2021-3872",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
"Impact": "High",
"Public": "20211019"
},
{
"ID": "CVE-2021-3875",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
"Impact": "Low",
"Public": "20211015"
},
{
"ID": "CVE-2021-3903",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
"Impact": "High",
"Public": "20211027"
},
{
"ID": "CVE-2021-3927",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
"Impact": "High",
"Public": "20211105"
},
{
"ID": "CVE-2021-3928",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-457",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
"Impact": "High",
"Public": "20211105"
},
{
"ID": "CVE-2021-3973",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
"Impact": "High",
"Public": "20211119"
},
{
"ID": "CVE-2021-3974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
"Impact": "High",
"Public": "20211119"
},
{
"ID": "CVE-2021-3984",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "CVE-2021-4019",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "CVE-2021-4069",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
"Impact": "High",
"Public": "20211206"
},
{
"ID": "CVE-2021-4136",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
"Impact": "High",
"Public": "20211219"
},
{
"ID": "CVE-2021-4166",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
"Impact": "High",
"Public": "20211225"
},
{
"ID": "CVE-2021-4173",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
"Impact": "High",
"Public": "20211227"
},
{
"ID": "CVE-2021-4187",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
"Impact": "High",
"Public": "20211229"
},
{
"ID": "CVE-2021-4192",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
"Impact": "High",
"Public": "20211231"
},
{
"ID": "CVE-2021-4193",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
"Impact": "Low",
"Public": "20211231"
},
{
"ID": "CVE-2022-0128",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
"Impact": "High",
"Public": "20220106"
},
{
"ID": "CVE-2022-0156",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "CVE-2022-0158",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "CVE-2022-0261",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
"Impact": "High",
"Public": "20220118"
},
{
"ID": "CVE-2022-0318",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
"Impact": "Critical",
"Public": "20220121"
},
{
"ID": "CVE-2022-0359",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0361",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0368",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0392",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
"Impact": "High",
"Public": "20220128"
},
{
"ID": "CVE-2022-0393",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
"Impact": "High",
"Public": "20220128"
},
{
"ID": "CVE-2022-0407",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "CVE-2022-0408",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "CVE-2022-0413",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "CVE-2022-0417",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "CVE-2022-0443",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
"Impact": "High",
"Public": "20220202"
},
{
"ID": "CVE-2022-0554",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
"Impact": "High",
"Public": "20220210"
},
{
"ID": "CVE-2022-0572",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
"Impact": "High",
"Public": "20220214"
},
{
"ID": "CVE-2022-0629",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
"Impact": "High",
"Public": "20220217"
},
{
"ID": "CVE-2022-0685",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
"Impact": "High",
"Public": "20220220"
},
{
"ID": "CVE-2022-0696",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
"Impact": "Low",
"Public": "20220221"
},
{
"ID": "CVE-2022-0714",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
"Impact": "Low",
"Public": "20220222"
},
{
"ID": "CVE-2022-0729",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
"Impact": "High",
"Public": "20220223"
},
{
"ID": "CVE-2022-0943",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
"Impact": "High",
"Public": "20220314"
},
{
"ID": "CVE-2022-1154",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"Impact": "High",
"Public": "20220330"
},
{
"ID": "CVE-2022-1160",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
"Impact": "High",
"Public": "20220330"
},
{
"ID": "CVE-2022-1381",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1381",
"Impact": "High",
"Public": "20220418"
},
{
"ID": "CVE-2022-1420",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420",
"Impact": "Low",
"Public": "20220421"
}
],
"Bugzilla": [
{
"ID": "35865",
"Href": "https://bugzilla.altlinux.org/35865",
"Data": "syntax/spec.vim не подсвечивает длинные CVE"
},
{
"ID": "37754",
"Href": "https://bugzilla.altlinux.org/37754",
"Data": "Добавить подсветку тега vcs"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221771001",
"Comment": "rpm-build-vim is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771002",
"Comment": "vim-X11 is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771003",
"Comment": "vim-X11-gnome2 is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771004",
"Comment": "vim-X11-gtk2 is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771005",
"Comment": "vim-X11-gtk3 is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771006",
"Comment": "vim-common is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771007",
"Comment": "vim-console is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771008",
"Comment": "vim-enhanced is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771009",
"Comment": "vim-minimal is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771010",
"Comment": "vim-spell-source is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771011",
"Comment": "vimtutor is earlier than 4:8.2.4784-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221771012",
"Comment": "xxd is earlier than 4:8.2.4784-alt1"
}
]
}
]
}
}
]
}