diff --git a/oval/c10f2/ALT-PU-2024-2935/definitions.json b/oval/c10f2/ALT-PU-2024-2935/definitions.json new file mode 100644 index 0000000000..24d609d7b9 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-2935/definitions.json @@ -0,0 +1,5562 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20242935", + "Version": "oval:org.altlinux.errata:def:20242935", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-2935: package `firefox-esr` update to version 115.8.0-alt0.c10.1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-2935", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-2935", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2022-04769", + "RefURL": "https://bdu.fstec.ru/vul/2022-04769", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-04776", + "RefURL": "https://bdu.fstec.ru/vul/2022-04776", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-05446", + "RefURL": "https://bdu.fstec.ru/vul/2022-05446", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-05447", + "RefURL": "https://bdu.fstec.ru/vul/2022-05447", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-05497", + "RefURL": "https://bdu.fstec.ru/vul/2022-05497", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-05560", + "RefURL": "https://bdu.fstec.ru/vul/2022-05560", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-05566", + "RefURL": "https://bdu.fstec.ru/vul/2022-05566", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06049", + "RefURL": "https://bdu.fstec.ru/vul/2022-06049", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06107", + "RefURL": "https://bdu.fstec.ru/vul/2022-06107", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06109", + "RefURL": "https://bdu.fstec.ru/vul/2022-06109", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06141", + "RefURL": "https://bdu.fstec.ru/vul/2022-06141", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06186", + "RefURL": "https://bdu.fstec.ru/vul/2022-06186", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06198", + "RefURL": "https://bdu.fstec.ru/vul/2022-06198", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06205", + "RefURL": "https://bdu.fstec.ru/vul/2022-06205", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06240", + "RefURL": "https://bdu.fstec.ru/vul/2022-06240", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06252", + "RefURL": "https://bdu.fstec.ru/vul/2022-06252", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06253", + "RefURL": "https://bdu.fstec.ru/vul/2022-06253", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06516", + "RefURL": "https://bdu.fstec.ru/vul/2022-06516", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06517", + "RefURL": "https://bdu.fstec.ru/vul/2022-06517", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06518", + "RefURL": "https://bdu.fstec.ru/vul/2022-06518", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06814", + "RefURL": "https://bdu.fstec.ru/vul/2022-06814", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06815", + "RefURL": "https://bdu.fstec.ru/vul/2022-06815", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06816", + "RefURL": "https://bdu.fstec.ru/vul/2022-06816", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06817", + "RefURL": "https://bdu.fstec.ru/vul/2022-06817", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06818", + "RefURL": "https://bdu.fstec.ru/vul/2022-06818", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06873", + "RefURL": "https://bdu.fstec.ru/vul/2022-06873", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-06961", + "RefURL": "https://bdu.fstec.ru/vul/2022-06961", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07016", + "RefURL": "https://bdu.fstec.ru/vul/2022-07016", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07019", + "RefURL": "https://bdu.fstec.ru/vul/2022-07019", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07061", + "RefURL": "https://bdu.fstec.ru/vul/2022-07061", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07066", + "RefURL": "https://bdu.fstec.ru/vul/2022-07066", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07068", + "RefURL": "https://bdu.fstec.ru/vul/2022-07068", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07069", + "RefURL": "https://bdu.fstec.ru/vul/2022-07069", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07070", + "RefURL": "https://bdu.fstec.ru/vul/2022-07070", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-07071", + "RefURL": "https://bdu.fstec.ru/vul/2022-07071", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00046", + "RefURL": "https://bdu.fstec.ru/vul/2023-00046", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00060", + "RefURL": "https://bdu.fstec.ru/vul/2023-00060", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00074", + "RefURL": "https://bdu.fstec.ru/vul/2023-00074", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00369", + "RefURL": "https://bdu.fstec.ru/vul/2023-00369", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00384", + "RefURL": "https://bdu.fstec.ru/vul/2023-00384", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00385", + "RefURL": "https://bdu.fstec.ru/vul/2023-00385", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00538", + "RefURL": "https://bdu.fstec.ru/vul/2023-00538", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00597", + "RefURL": "https://bdu.fstec.ru/vul/2023-00597", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00598", + "RefURL": "https://bdu.fstec.ru/vul/2023-00598", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00602", + "RefURL": "https://bdu.fstec.ru/vul/2023-00602", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01262", + "RefURL": "https://bdu.fstec.ru/vul/2023-01262", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01263", + "RefURL": "https://bdu.fstec.ru/vul/2023-01263", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01264", + "RefURL": "https://bdu.fstec.ru/vul/2023-01264", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01265", + "RefURL": "https://bdu.fstec.ru/vul/2023-01265", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01266", + "RefURL": "https://bdu.fstec.ru/vul/2023-01266", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01267", + "RefURL": "https://bdu.fstec.ru/vul/2023-01267", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01269", + "RefURL": "https://bdu.fstec.ru/vul/2023-01269", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01270", + "RefURL": "https://bdu.fstec.ru/vul/2023-01270", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01271", + "RefURL": "https://bdu.fstec.ru/vul/2023-01271", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01272", + "RefURL": "https://bdu.fstec.ru/vul/2023-01272", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01452", + "RefURL": "https://bdu.fstec.ru/vul/2023-01452", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01556", + "RefURL": "https://bdu.fstec.ru/vul/2023-01556", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01557", + "RefURL": "https://bdu.fstec.ru/vul/2023-01557", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01558", + "RefURL": "https://bdu.fstec.ru/vul/2023-01558", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01559", + "RefURL": "https://bdu.fstec.ru/vul/2023-01559", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01560", + "RefURL": "https://bdu.fstec.ru/vul/2023-01560", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01561", + "RefURL": "https://bdu.fstec.ru/vul/2023-01561", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01562", + "RefURL": "https://bdu.fstec.ru/vul/2023-01562", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01563", + "RefURL": "https://bdu.fstec.ru/vul/2023-01563", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01803", + "RefURL": "https://bdu.fstec.ru/vul/2023-01803", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-01807", + "RefURL": "https://bdu.fstec.ru/vul/2023-01807", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02676", + "RefURL": "https://bdu.fstec.ru/vul/2023-02676", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02677", + "RefURL": "https://bdu.fstec.ru/vul/2023-02677", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02678", + "RefURL": "https://bdu.fstec.ru/vul/2023-02678", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02689", + "RefURL": "https://bdu.fstec.ru/vul/2023-02689", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02691", + "RefURL": "https://bdu.fstec.ru/vul/2023-02691", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02692", + "RefURL": "https://bdu.fstec.ru/vul/2023-02692", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02693", + "RefURL": "https://bdu.fstec.ru/vul/2023-02693", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02694", + "RefURL": "https://bdu.fstec.ru/vul/2023-02694", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02783", + "RefURL": "https://bdu.fstec.ru/vul/2023-02783", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02803", + "RefURL": "https://bdu.fstec.ru/vul/2023-02803", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02804", + "RefURL": "https://bdu.fstec.ru/vul/2023-02804", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02805", + "RefURL": "https://bdu.fstec.ru/vul/2023-02805", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02806", + "RefURL": "https://bdu.fstec.ru/vul/2023-02806", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02807", + "RefURL": "https://bdu.fstec.ru/vul/2023-02807", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02808", + "RefURL": "https://bdu.fstec.ru/vul/2023-02808", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02809", + "RefURL": "https://bdu.fstec.ru/vul/2023-02809", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02811", + "RefURL": "https://bdu.fstec.ru/vul/2023-02811", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02812", + "RefURL": "https://bdu.fstec.ru/vul/2023-02812", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02813", + "RefURL": "https://bdu.fstec.ru/vul/2023-02813", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02814", + "RefURL": "https://bdu.fstec.ru/vul/2023-02814", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03004", + "RefURL": "https://bdu.fstec.ru/vul/2023-03004", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03125", + "RefURL": "https://bdu.fstec.ru/vul/2023-03125", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03196", + "RefURL": "https://bdu.fstec.ru/vul/2023-03196", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03197", + "RefURL": "https://bdu.fstec.ru/vul/2023-03197", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03198", + "RefURL": "https://bdu.fstec.ru/vul/2023-03198", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03686", + "RefURL": "https://bdu.fstec.ru/vul/2023-03686", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03964", + "RefURL": "https://bdu.fstec.ru/vul/2023-03964", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04015", + "RefURL": "https://bdu.fstec.ru/vul/2023-04015", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04016", + "RefURL": "https://bdu.fstec.ru/vul/2023-04016", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04017", + "RefURL": "https://bdu.fstec.ru/vul/2023-04017", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04018", + "RefURL": "https://bdu.fstec.ru/vul/2023-04018", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04019", + "RefURL": "https://bdu.fstec.ru/vul/2023-04019", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04020", + "RefURL": "https://bdu.fstec.ru/vul/2023-04020", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04021", + "RefURL": "https://bdu.fstec.ru/vul/2023-04021", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04022", + "RefURL": "https://bdu.fstec.ru/vul/2023-04022", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04023", + "RefURL": "https://bdu.fstec.ru/vul/2023-04023", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04024", + "RefURL": "https://bdu.fstec.ru/vul/2023-04024", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04025", + "RefURL": "https://bdu.fstec.ru/vul/2023-04025", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04026", + "RefURL": "https://bdu.fstec.ru/vul/2023-04026", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04325", + "RefURL": "https://bdu.fstec.ru/vul/2023-04325", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04326", + "RefURL": "https://bdu.fstec.ru/vul/2023-04326", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04327", + "RefURL": "https://bdu.fstec.ru/vul/2023-04327", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04439", + "RefURL": "https://bdu.fstec.ru/vul/2023-04439", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04440", + "RefURL": "https://bdu.fstec.ru/vul/2023-04440", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04441", + "RefURL": "https://bdu.fstec.ru/vul/2023-04441", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04442", + "RefURL": "https://bdu.fstec.ru/vul/2023-04442", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04443", + "RefURL": "https://bdu.fstec.ru/vul/2023-04443", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04444", + "RefURL": "https://bdu.fstec.ru/vul/2023-04444", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04498", + "RefURL": "https://bdu.fstec.ru/vul/2023-04498", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04499", + "RefURL": "https://bdu.fstec.ru/vul/2023-04499", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04802", + "RefURL": "https://bdu.fstec.ru/vul/2023-04802", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04816", + "RefURL": "https://bdu.fstec.ru/vul/2023-04816", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04817", + "RefURL": "https://bdu.fstec.ru/vul/2023-04817", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04818", + "RefURL": "https://bdu.fstec.ru/vul/2023-04818", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04821", + "RefURL": "https://bdu.fstec.ru/vul/2023-04821", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04822", + "RefURL": "https://bdu.fstec.ru/vul/2023-04822", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04823", + "RefURL": "https://bdu.fstec.ru/vul/2023-04823", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04824", + "RefURL": "https://bdu.fstec.ru/vul/2023-04824", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04825", + "RefURL": "https://bdu.fstec.ru/vul/2023-04825", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04827", + "RefURL": "https://bdu.fstec.ru/vul/2023-04827", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04828", + "RefURL": "https://bdu.fstec.ru/vul/2023-04828", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-04829", + "RefURL": "https://bdu.fstec.ru/vul/2023-04829", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05101", + "RefURL": "https://bdu.fstec.ru/vul/2023-05101", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05102", + "RefURL": "https://bdu.fstec.ru/vul/2023-05102", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05173", + "RefURL": "https://bdu.fstec.ru/vul/2023-05173", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05174", + "RefURL": "https://bdu.fstec.ru/vul/2023-05174", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05175", + "RefURL": "https://bdu.fstec.ru/vul/2023-05175", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05176", + "RefURL": "https://bdu.fstec.ru/vul/2023-05176", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05177", + "RefURL": "https://bdu.fstec.ru/vul/2023-05177", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05178", + "RefURL": "https://bdu.fstec.ru/vul/2023-05178", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05179", + "RefURL": "https://bdu.fstec.ru/vul/2023-05179", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05180", + "RefURL": "https://bdu.fstec.ru/vul/2023-05180", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05181", + "RefURL": "https://bdu.fstec.ru/vul/2023-05181", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05182", + "RefURL": "https://bdu.fstec.ru/vul/2023-05182", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05510", + "RefURL": "https://bdu.fstec.ru/vul/2023-05510", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05886", + "RefURL": "https://bdu.fstec.ru/vul/2023-05886", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05888", + "RefURL": "https://bdu.fstec.ru/vul/2023-05888", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05889", + "RefURL": "https://bdu.fstec.ru/vul/2023-05889", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05890", + "RefURL": "https://bdu.fstec.ru/vul/2023-05890", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05891", + "RefURL": "https://bdu.fstec.ru/vul/2023-05891", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05892", + "RefURL": "https://bdu.fstec.ru/vul/2023-05892", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05893", + "RefURL": "https://bdu.fstec.ru/vul/2023-05893", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05894", + "RefURL": "https://bdu.fstec.ru/vul/2023-05894", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-06157", + "RefURL": "https://bdu.fstec.ru/vul/2023-06157", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-06372", + "RefURL": "https://bdu.fstec.ru/vul/2023-06372", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07184", + "RefURL": "https://bdu.fstec.ru/vul/2023-07184", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07235", + "RefURL": "https://bdu.fstec.ru/vul/2023-07235", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07278", + "RefURL": "https://bdu.fstec.ru/vul/2023-07278", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07279", + "RefURL": "https://bdu.fstec.ru/vul/2023-07279", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07280", + "RefURL": "https://bdu.fstec.ru/vul/2023-07280", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07281", + "RefURL": "https://bdu.fstec.ru/vul/2023-07281", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07282", + "RefURL": "https://bdu.fstec.ru/vul/2023-07282", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07283", + "RefURL": "https://bdu.fstec.ru/vul/2023-07283", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07284", + "RefURL": "https://bdu.fstec.ru/vul/2023-07284", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07285", + "RefURL": "https://bdu.fstec.ru/vul/2023-07285", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07665", + "RefURL": "https://bdu.fstec.ru/vul/2023-07665", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07671", + "RefURL": "https://bdu.fstec.ru/vul/2023-07671", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08086", + "RefURL": "https://bdu.fstec.ru/vul/2023-08086", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08087", + "RefURL": "https://bdu.fstec.ru/vul/2023-08087", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08088", + "RefURL": "https://bdu.fstec.ru/vul/2023-08088", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08115", + "RefURL": "https://bdu.fstec.ru/vul/2023-08115", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08116", + "RefURL": "https://bdu.fstec.ru/vul/2023-08116", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08322", + "RefURL": "https://bdu.fstec.ru/vul/2023-08322", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08332", + "RefURL": "https://bdu.fstec.ru/vul/2023-08332", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09018", + "RefURL": "https://bdu.fstec.ru/vul/2023-09018", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09031", + "RefURL": "https://bdu.fstec.ru/vul/2023-09031", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09055", + "RefURL": "https://bdu.fstec.ru/vul/2023-09055", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09058", + "RefURL": "https://bdu.fstec.ru/vul/2023-09058", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09059", + "RefURL": "https://bdu.fstec.ru/vul/2023-09059", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09062", + "RefURL": "https://bdu.fstec.ru/vul/2023-09062", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09099", + "RefURL": "https://bdu.fstec.ru/vul/2023-09099", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09115", + "RefURL": "https://bdu.fstec.ru/vul/2023-09115", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09116", + "RefURL": "https://bdu.fstec.ru/vul/2023-09116", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09117", + "RefURL": "https://bdu.fstec.ru/vul/2023-09117", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09118", + "RefURL": "https://bdu.fstec.ru/vul/2023-09118", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-09119", + "RefURL": "https://bdu.fstec.ru/vul/2023-09119", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00730", + "RefURL": "https://bdu.fstec.ru/vul/2024-00730", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00803", + "RefURL": "https://bdu.fstec.ru/vul/2024-00803", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00805", + "RefURL": "https://bdu.fstec.ru/vul/2024-00805", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00807", + "RefURL": "https://bdu.fstec.ru/vul/2024-00807", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00808", + "RefURL": "https://bdu.fstec.ru/vul/2024-00808", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00810", + "RefURL": "https://bdu.fstec.ru/vul/2024-00810", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00812", + "RefURL": "https://bdu.fstec.ru/vul/2024-00812", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00813", + "RefURL": "https://bdu.fstec.ru/vul/2024-00813", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00814", + "RefURL": "https://bdu.fstec.ru/vul/2024-00814", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01619", + "RefURL": "https://bdu.fstec.ru/vul/2024-01619", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01659", + "RefURL": "https://bdu.fstec.ru/vul/2024-01659", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01660", + "RefURL": "https://bdu.fstec.ru/vul/2024-01660", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01661", + "RefURL": "https://bdu.fstec.ru/vul/2024-01661", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01662", + "RefURL": "https://bdu.fstec.ru/vul/2024-01662", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01663", + "RefURL": "https://bdu.fstec.ru/vul/2024-01663", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-01664", + "RefURL": "https://bdu.fstec.ru/vul/2024-01664", + "Source": "BDU" + }, + { + "RefID": "CVE-2022-2505", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2505", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-3266", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3266", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-36315", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36315", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-36316", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36316", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-36318", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36318", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-36319", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36319", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-36320", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36320", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-38472", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38472", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-38473", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38473", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-38475", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38475", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-38477", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38477", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-38478", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38478", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-40956", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40956", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-40957", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40957", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-40958", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40958", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-40959", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40959", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-40960", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40960", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-40962", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40962", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-42927", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42927", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-42928", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42928", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-42929", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42929", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-42930", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42930", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-42931", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42931", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-42932", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42932", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45403", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45403", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45404", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45404", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45405", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45405", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45406", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45406", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45407", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45407", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45408", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45408", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45409", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45409", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45410", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45410", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45411", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45411", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45415", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45415", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45416", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45416", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45417", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45417", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45418", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45418", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45419", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45419", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45420", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45420", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-45421", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45421", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46871", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46871", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46872", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46872", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46873", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46873", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46874", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46874", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46877", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46877", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46878", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46878", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46879", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46879", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46880", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46880", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46881", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46881", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46882", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46882", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46883", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46883", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46884", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46884", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46885", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46885", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-0767", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0767", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23597", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23597", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23598", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23598", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23599", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23599", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23601", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23601", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23602", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23602", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23603", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23603", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23604", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23604", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23605", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23605", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-23606", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23606", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25728", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25728", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25729", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25729", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25730", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25730", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25731", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25731", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25732", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25732", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25733", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25733", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25735", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25735", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25736", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25736", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25737", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25737", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25739", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25739", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25740", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25740", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25741", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25741", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25742", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25742", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25744", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25744", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25745", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25745", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25750", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25750", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25751", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25751", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-25752", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25752", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28159", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28159", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28160", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28160", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28161", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28161", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28162", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28162", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28163", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28163", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28164", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28164", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28176", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28176", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-28177", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28177", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29533", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29533", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29535", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29535", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29536", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29536", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29537", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29537", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29538", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29538", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29539", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29539", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29540", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29540", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29541", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29541", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29543", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29543", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29544", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29544", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29545", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29545", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29547", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29547", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29548", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29548", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29549", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29549", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29550", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29550", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29551", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29551", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32205", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32205", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32206", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32206", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32207", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32207", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32208", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32208", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32209", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32209", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32210", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32210", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32211", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32211", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32212", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32212", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32213", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32213", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32215", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32215", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32216", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32216", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-34414", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34414", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-34415", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34415", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-34416", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34416", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-34417", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34417", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-3482", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3482", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-3600", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3600", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37201", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37201", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37202", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37202", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37203", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37203", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37204", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37204", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37205", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37205", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37206", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37206", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37207", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37207", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37208", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37208", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37209", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37209", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37210", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37210", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37211", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37211", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37212", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37212", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4045", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4045", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4046", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4046", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4047", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4047", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4048", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4048", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4049", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4049", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4050", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4050", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4051", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4051", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4052", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4052", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4053", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4053", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4054", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4054", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4055", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4055", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4056", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4056", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4057", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4057", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4573", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4573", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4574", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4574", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4575", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4575", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4576", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4576", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4577", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4577", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4578", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4578", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4580", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4580", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4581", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4581", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4582", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4582", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4583", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4583", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4584", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4584", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4585", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4585", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-4863", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4863", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5168", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5168", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5169", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5169", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5171", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5171", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5174", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5174", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5176", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5176", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5217", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5217", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5721", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5721", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5724", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5724", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5725", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5725", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5726", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5726", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5727", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5727", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5728", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5728", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5730", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5730", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5732", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5732", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6204", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6204", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6205", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6205", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6206", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6206", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6207", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6207", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6208", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6208", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6209", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6209", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6212", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6212", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6856", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6856", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6857", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6857", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6858", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6858", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6859", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6859", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6860", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6860", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6861", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6861", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6862", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6862", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6863", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6863", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6864", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6864", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6865", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6865", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6867", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6867", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0741", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0741", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0742", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0742", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0746", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0746", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0747", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0747", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0749", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0749", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0750", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0750", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0751", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0751", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0753", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0753", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0755", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0755", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1546", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1546", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1547", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1547", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1548", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1548", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1549", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1549", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1550", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1550", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1551", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1551", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1552", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1552", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-1553", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1553", + "Source": "CVE" + } + ], + "Description": "This update upgrades firefox-esr to version 115.8.0-alt0.c10.1. \nSecurity Fix(es):\n\n * BDU:2022-04769: Уязвимость браузера Mozilla Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04776: Уязвимость браузера Mozilla Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05446: Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05447: Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05497: Уязвимость реализации технологии XSLT (eXtensible Stylesheet Language Transformations) почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05560: Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-05566: Уязвимость реализации технологии XSLT (eXtensible Stylesheet Language Transformations) браузера Firefox и почтового клиента Thunderbirds, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-06049: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06107: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06109: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками управления ресурсом, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2022-06141: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю раскрыть защищаемую информацию, изменить внешний вид веб-страницы, выполнить фишинговые атаки\n\n * BDU:2022-06186: Уязвимость веб-браузера Firefox, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06198: Уязвимость реализации конфигурации CSP: base-uri браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-06205: Уязвимость реализации технологии WASM браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06240: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничение безопасного контекста для файлов cookie с префиксом __Host и __Secure и перезаписать эти файлы\n\n * BDU:2022-06252: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-06253: Уязвимость реализации механизма FeaturePolicy браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-06516: Уязвимость функции Window.print() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06517: Уязвимость компонента Garbage Collector («Сборщик мусора») обработчика JavaScript-сценариев JS Engine браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-06518: Уязвимость метода performance.getEntries() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06814: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-06815: Уязвимость интерфейса InputStream браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06816: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06817: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связана с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-06818: Уязвимость компонента Garbage Collector («Сборщик мусора») браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06873: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-06961: Уязвимость службы Service Workers браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить информацию о наличии или длине медиафайла\n\n * BDU:2022-07016: Уязвимость службы Service Workers браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-07019: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07061: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками в настройках безопасности, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-07066: Уязвимость браузера Firefox, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-07068: Уязвимость компонента Form Manager браузера Firefox, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-07069: Уязвимость реализации метода Trace браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)\n\n * BDU:2022-07070: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-07071: Уязвимость изолированной среды iframe браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2023-00046: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-00060: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00074: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Mozilla Thunderbird, связанная с недостаточной защитой служебных данных, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00369: Уязвимость реализации функции ParseFromSafeString() интерфейса DOMParser браузера Mozilla Firefox, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2023-00384: Уязвимость реализации полноэкранного предупреждающего сообщения браузера Mozilla Firefox, позволяющая нарушителю произвести спуфинговую атаку\n\n * BDU:2023-00385: Уязвимость библиотеки libusrsctp браузера Mozilla Firefox, позволяющая нарушителю вызвать использование уязвимой библиотеки и произвести атаку на устройство\n\n * BDU:2023-00538: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00597: Уязвимость браузера Mozilla Firefox, связанная с ошибками в настройках безопасности, позволяющая нарушителю читать произвольные файлы\n\n * BDU:2023-00598: Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00602: Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с ошибками при интерпретации данных, загруженных несколькими способами, позволяющая нарушителю читать произвольные файлы\n\n * BDU:2023-01262: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе\n\n * BDU:2023-01263: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками при импорте открытого ключа SPKI RSA в качестве ECDSA P-256, позволяющая нарушителю привести к сбою вкладки\n\n * BDU:2023-01264: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с недопустимым понижение из nsTextNode в SVGElement, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01265: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением отображаемых слоев или фреймов пользовательского интерфейса, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-01266: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю хранить объекты из других разделов в основном разделе\n\n * BDU:2023-01267: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с тем, что при кодировании данных из \u0026quot;InputStream\u0026quot; в \u0026quot;xpcom\u0026quot; размер кодируемых входных данных будет неправильно рассчитан, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01269: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01270: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю запустить произвольную запись в память\n\n * BDU:2023-01271: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильной нейтрализаций закодированных схем URI на веб-странице, позволяющая нарушителю загрузить файлы или взаимодействовать с программным обеспечением, уже установленным в системе\n\n * BDU:2023-01272: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю принудительно перевести браузер в полноэкранный режим\n\n * BDU:2023-01452: Уязвимость браузера Mozilla Firefox, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-01556: Уязвимость браузера Mozilla Firefox, связанная с ошибками при обработке гипертекстовых ссылок, позволяющая нарушителю преобразовать URL-адрес в локальный путь и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-01557: Уязвимость режима приватного просмотра браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-01558: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-01559: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01560: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01561: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверным управлением генерацией кода, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2023-01562: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2023-01563: Уязвимость интерфейса AudioWorklet браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01803: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, связанная с недостаточной защитой служебных данных, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2023-01807: Уязвимость полноэкранного режима уведомлений браузера Mozilla Firefox операционных систем Android, позволяющая нарушителю проводить спуфинг атаки\n\n * BDU:2023-02676: Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с освобождением недопустимого указателя, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-02677: Уязвимость метода window.open браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю скрыть полноэкранные уведомления и осуществить спуфинг-атаку\n\n * BDU:2023-02678: Уязвимость компонента Garbage Collector («Сборщик мусора») браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-02689: Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с некорректной обработкой имен файлов, оканчивающихся на .desktop, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды\n\n * BDU:2023-02691: Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2023-02692: Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-02693: Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с использованием неправильной инструкции понижения в компиляторе ARM64 Ion, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-02694: Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с неправильной обработкой директивы заголовка Content-Disposition, позволяющая нарушителю обойти ограничения безопасности и загрузить произвольные файлы\n\n * BDU:2023-02783: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти в процессе некорректного программного рендеринга видео с кодировкой H.264, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2023-02803: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02804: Уязвимость браузеров Firefox и Firefox ESR, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю выполнить спуфинговую атаку\n\n * BDU:2023-02805: Уязвимость функции FileReader::DoReadData() браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2023-02806: Уязвимость браузеров Firefox и Firefox ESR, связанная с ошибками смешения типов данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02807: Уязвимость браузеров Firefox и Firefox ESR, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02808: Уязвимость браузеров Firefox и Firefox ESR, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю вызвать загрузку документа с более высоким уровнем привилегий\n\n * BDU:2023-02809: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю выполнить спуфинговую атаку\n\n * BDU:2023-02811: Уязвимость браузеров Firefox и Firefox ESR, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-02812: Уязвимость браузеров Firefox и Firefox ESR, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02813: Уязвимость драйвера RLBox Expat браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2023-02814: Уязвимость браузеров Firefox и Firefox ESR, существующая из-за отсутствия задержки всплывающих уведомлений, позволяющая нарушителю получить несанкционированный доступ к определенным функциям браузера\n\n * BDU:2023-03004: Уязвимость браузеров Mozilla Firefox и Focus for Android, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2023-03125: Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-03196: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверным ограничением визуализируемых слоев пользовательского интерфейса, позволяющая нарушителю провести атаку типа clickjacking («захват клика»)\n\n * BDU:2023-03197: Уязвимость браузера Mozilla Firefox, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю обойти ограничения безопасности и перенаправить пользователя на произвольный URL-адрес\n\n * BDU:2023-03198: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-03686: Уязвимость браузера Mozilla Firefox операционных систем Windows, связанная с ошибками в настройках безопасности, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-03964: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04015: Уязвимость компонента RTL Arabic Character Handler браузера Mozilla Firefox, позволяющая нарушителю проводить спуфинг-атаки с помощью специально созданной веб-страницы\n\n * BDU:2023-04016: Уязвимость полноэкранного уведомления браузера Mozilla Firefox, позволяющая нарушителю провести спуфинг-атаки\n\n * BDU:2023-04017: Уязвимость локального хранилища (localstorage) браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-04018: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием предупреждения при открытии Diagcab-файлов, позволяющая нарушителю выполнить спуфинг-атаки\n\n * BDU:2023-04019: Уязвимость полноэкранного уведомления браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить спуфинг-атаки\n\n * BDU:2023-04020: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с записью данных за пределами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04021: Уязвимость функции NotifyOnHistoryReload браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04022: Уязвимость полноэкранного режима браузера Mozilla Firefox, позволяющая нарушителю выполнить спуфинговую атаку\n\n * BDU:2023-04023: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04024: Уязвимость технологии WebRTC браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-04025: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-04026: Уязвимость интерфейса Drag and Drop API браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04325: Уязвимость браузеров Firefox, Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04326: Уязвимость функции OffscreenCanvas браузеров Firefox, Firefox ESR , позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04327: Уязвимость компонента WASM JIT браузера Firefox, браузеров Firefox Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04439: Уязвимость интерфейса DOMParser браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2023-04440: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками управления состоянием в результате превышения количества файлов cookie в document.cookie, позволяющая нарушителю оказать влияние на целостность защищаемой информации\n\n * BDU:2023-04441: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04442: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04443: Уязвимость менеджера хранилища StorageManager браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности и вызвать отказ в обслуживании\n\n * BDU:2023-04444: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректной обработкой недостаточных разрешений, позволяющая нарушителю проводить clickjacking-атаки\n\n * BDU:2023-04498: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, связанная с недостаточным предупреждением об опасных действиях, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04499: Уязвимость загрузчика обновлений браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов\n\n * BDU:2023-04802: Уязвимость веб-браузера Firefox, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04816: Уязвимость веб-браузера Firefox, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04817: Уязвимость веб-браузеров Firefox ESR, Firefox, почтового клиента Thunderbird, связанная с сокрытием важной для безопасности информации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04818: Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04821: Уязвимость веб-браузера Firefox, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04822: Уязвимость веб-браузера Firefox, связанная с использованием недоверенного файла междоменной политики, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2023-04823: Уязвимость веб-браузера Firefox, связанная с ошибками преобразования типов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04824: Уязвимость функции gfx::SourceSurfaceSkia::Map() веб-браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04825: Уязвимость веб-браузера Firefox, связанная с ошибками при освобождении ресурсов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-04827: Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с недостаточной обработкой регулярных выражений, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2023-04828: Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с недостаточной проверкой необычных или исключительных состояний, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2023-04829: Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с недостатком в механизме подтверждения источника, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2023-05101: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05102: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05173: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостаточным предупреждением об опасных действиях, позволяющая нарушителю загружать произвольные файлы\n\n * BDU:2023-05174: Уязвимость функции UpdateRegExpStatics браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05175: Уязвимость функции FilePickerShownCallback браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-05176: Уязвимость функции ColorPickerShownCallback браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-05177: Уязвимость компонента RecordedSourceSurfaceCreation браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05178: Уязвимость push-уведомлений браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-05179: Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05180: Уязвимость функции glGetProgramiv браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-05181: Уязвимость компонента IPC CanvasTranslator браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-05182: Уязвимость режима приватности браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-05510: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05886: Уязвимость браузеров Firefox, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-05888: Уязвимость веб-браузера Firefox, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-05889: Уязвимость веб-браузера Firefox, связанная с одновременным выполнением с использованием общего ресурса с неправильной синхронизацией, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-05890: Уязвимость компонента WebExtension веб-браузера Firefox, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2023-05891: Уязвимость веб-браузера Firefox, связанная с использованием открытой переадресации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2023-05892: Уязвимость веб-браузера Firefox, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-05893: Уязвимость веб-браузера Firefox, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05894: Уязвимость веб-браузера Firefox, связанная с слабым шифрованием, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2023-06157: Уязвимость функции кодирования в формат VP8 библиотеки libvpx браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-06372: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07184: Уязвимость набора инструментов для веб-разработки DevTools браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2023-07235: Уязвимость почтового клиента Thunderbird и браузеров Firefox, Firefox ESR, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-07278: Уязвимость API для 3D-графики WebGL браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07279: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес\n\n * BDU:2023-07280: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю провести атаку типа clickjacking («захват клика»)\n\n * BDU:2023-07281: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-07282: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с недостаточным предупреждением об опасных действиях, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-07283: Уязвимость компонента Garbage Collector («Сборщик мусора») браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07284: Уязвимость полноэкранного режима браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2023-07285: Уязвимость браузера Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2023-07665: Уязвимость веб-браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07671: Уязвимость веб-браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-08086: Уязвимость метода WebGL2RenderingContext.blitFramebuffer() интерфейса WebGL2 браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-08087: Уязвимость полноэкранного режима браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю провести атаку типа clickjacking («захват клика»)\n\n * BDU:2023-08088: Уязвимость системы графического отображения X11 браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2023-08115: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-08116: Уязвимость функции MessagePort::Entangled() браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие\n\n * BDU:2023-08322: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверным ограничением имени пути с символами \u0026quot;/.. /\u0026quot;, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-08332: Уязвимость функции ReadableByteStreams браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-09018: Уязвимость браузеров Firefox, Firefox ESR, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю провести атаку типа clickjacking («захват клика»)\n\n * BDU:2023-09031: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с нарушением начальной границы буфера, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность данных\n\n * BDU:2023-09055: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-09058: Уязвимость компонента VideoBridge браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти защитный механизм защиты изолированной программной среды\n\n * BDU:2023-09059: Уязвимость режима инкогнито браузеров Mozilla Firefox, Firefox ESR, связанная с использованием неинициализированных переменных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-09062: Уязвимость файла nsDNSService::Init браузера Mozilla Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-09099: Уязвимость веб-браузеров Firefox и Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-09115: Уязвимость функции nsTextFragment браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-09116: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-09117: Уязвимость метода nsWindow::PickerOpen(void) браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-09118: Уязвимость функции ShutdownObserver() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-09119: Уязвимость метода WebGL DrawElementsInstanced браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-00730: Уязвимость реализации механизма HSTS (HTTP Strict Transport Security) браузервов Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти механизмы защиты\n\n * BDU:2024-00803: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-00805: Уязвимость набора инструментов для веб-разработки DevTools браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю повысить привилегии\n\n * BDU:2024-00807: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками в настройках безопасности, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-00808: Уязвимость библиотеки ANGLE браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00810: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird для операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00812: Уязвимость изолированной среды iframe браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности и изменить CSP (Content Security Policy)\n\n * BDU:2024-00813: Уязвимость всплывающих уведомлений браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю предоставить разрешения для веб-сайта\n\n * BDU:2024-00814: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю провести спуфинг-атаки\n\n * BDU:2024-01619: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2024-01659: Уязвимость полноэкранного режима браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2024-01660: Уязвимость реализации отображения курсора браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить произвольные разрешения на веб-сайте без согласия пользователя\n\n * BDU:2024-01661: Уязвимость интерфейса API браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю отобразить alertdialog на другом веб-сайте\n\n * BDU:2024-01662: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверным ограничением визуализируемых слоев или фреймов пользовательского интерфейса, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-01663: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверной нейтрализацией особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю внедрить произвольные HTTP-заголовки\n\n * BDU:2024-01664: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверной нейтрализацией особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2022-2505: Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.\n\n * CVE-2022-3266: An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-36315: When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-36316: When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-36318: When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.\n\n * CVE-2022-36319: When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.\n\n * CVE-2022-36320: Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-38472: An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-38473: A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access). This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-38475: An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox \u003c 104.\n\n * CVE-2022-38477: Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.2, Thunderbird \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-38478: Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-40956: When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40957: Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.\u003cbr\u003e*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40958: By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40959: During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40960: Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40962: Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-42927: A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via `performance.getEntries()`. This vulnerability affects Firefox \u003c 106, Firefox ESR \u003c 102.4, and Thunderbird \u003c 102.4.\n\n * CVE-2022-42928: Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox \u003c 106, Firefox ESR \u003c 102.4, and Thunderbird \u003c 102.4.\n\n * CVE-2022-42929: If a website called `window.print()` in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Firefox \u003c 106, Firefox ESR \u003c 102.4, and Thunderbird \u003c 102.4.\n\n * CVE-2022-42930: If two Workers were simultaneously initializing their CacheStorage, a data race could have occurred in the `ThirdPartyUtil` component. This vulnerability affects Firefox \u003c 106.\n\n * CVE-2022-42931: Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk. Instead, the username (not password) was saved by the Form Manager to an unencrypted file on disk. This vulnerability affects Firefox \u003c 106.\n\n * CVE-2022-42932: Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105 and Firefox ESR 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 106, Firefox ESR \u003c 102.4, and Thunderbird \u003c 102.4.\n\n * CVE-2022-45403: Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45404: Through a series of popup and \u003ccode\u003ewindow.print()\u003c/code\u003e calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45405: Freeing arbitrary \u003ccode\u003ensIInputStream\u003c/code\u003e's on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45406: If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45407: If an attacker loaded a font using \u003ccode\u003eFontFace()\u003c/code\u003e on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. This vulnerability affects Firefox \u003c 107.\n\n * CVE-2022-45408: Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45409: The garbage collector could have been aborted in several states and zones and \u003ccode\u003eGCRuntime::finishCollection\u003c/code\u003e may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45410: When a ServiceWorker intercepted a request with \u003ccode\u003eFetchEvent\u003c/code\u003e, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45411: Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on \u003ccode\u003efetch()\u003c/code\u003e and XMLHttpRequest; however some webservers have implemented non-standard headers such as \u003ccode\u003eX-Http-Method-Override\u003c/code\u003e that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45415: When downloading an HTML file, if the title of the page was formatted as a filename with a malicious extension, Firefox may have saved the file with that extension, leading to possible system compromise if the downloaded file was later ran. This vulnerability affects Firefox \u003c 107.\n\n * CVE-2022-45416: Keyboard events reference strings like \"KeyA\" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45417: Service Workers did not detect Private Browsing Mode correctly in all cases, which could have led to Service Workers being written to disk for websites visited in Private Browsing Mode. This would not have persisted them in a state where they would run again, but it would have leaked Private Browsing Mode details to disk. This vulnerability affects Firefox \u003c 107.\n\n * CVE-2022-45418: If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45419: If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox \u003c 107.\n\n * CVE-2022-45420: Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-45421: Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.5, Thunderbird \u003c 102.5, and Firefox \u003c 107.\n\n * CVE-2022-46871: An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox \u003c 108.\n\n * CVE-2022-46872: An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.\u003cbr\u003e*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 108, Firefox ESR \u003c 102.6, and Thunderbird \u003c 102.6.\n\n * CVE-2022-46873: Because Firefox did not implement the \u003ccode\u003eunsafe-hashes\u003c/code\u003e CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox \u003c 108.\n\n * CVE-2022-46874: A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.\u003cbr/\u003e*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox \u003c 108, Thunderbird \u003c 102.6.1, Thunderbird \u003c 102.6, and Firefox ESR \u003c 102.6.\n\n * CVE-2022-46877: By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox \u003c 108.\n\n * CVE-2022-46878: Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 108, Firefox ESR \u003c 102.6, and Thunderbird \u003c 102.6.\n\n * CVE-2022-46879: Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 108.\n\n * CVE-2022-46880: A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.\u003cbr /\u003e*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR \u003c 102.6, Firefox \u003c 105, and Thunderbird \u003c 102.6.\n\n * CVE-2022-46881: An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.\n*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox \u003c 106, Firefox ESR \u003c 102.6, and Thunderbird \u003c 102.6.\n\n * CVE-2022-46882: A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox \u003c 107, Firefox ESR \u003c 102.6, and Thunderbird \u003c 102.6.\n\n * CVE-2022-46883: Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.\u003cbr /\u003e*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox \u003c 107.\n\n * CVE-2022-46884: A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash.\n*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox \u003c 106.\n\n * CVE-2022-46885: Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 106.\n\n * CVE-2023-0767: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-23597: A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the \u003ccode\u003efile://\u003c/code\u003e context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox \u003c 109.\n\n * CVE-2023-23598: Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to \u003ccode\u003eDataTransfer.setData\u003c/code\u003e. This vulnerability affects Firefox \u003c 109, Thunderbird \u003c 102.7, and Firefox ESR \u003c 102.7.\n\n * CVE-2023-23599: When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox \u003c 109, Thunderbird \u003c 102.7, and Firefox ESR \u003c 102.7.\n\n * CVE-2023-23601: Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks. This vulnerability affects Firefox \u003c 109, Thunderbird \u003c 102.7, and Firefox ESR \u003c 102.7.\n\n * CVE-2023-23602: A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox \u003c 109, Thunderbird \u003c 102.7, and Firefox ESR \u003c 102.7.\n\n * CVE-2023-23603: Regular expressions used to filter out forbidden properties and values from style directives in calls to \u003ccode\u003econsole.log\u003c/code\u003e weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox \u003c 109, Thunderbird \u003c 102.7, and Firefox ESR \u003c 102.7.\n\n * CVE-2023-23604: A duplicate \u003ccode\u003eSystemPrincipal\u003c/code\u003e object could be created when parsing a non-system html document via \u003ccode\u003eDOMParser::ParseFromSafeString\u003c/code\u003e. This could have lead to bypassing web security checks. This vulnerability affects Firefox \u003c 109.\n\n * CVE-2023-23605: Memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 109, Thunderbird \u003c 102.7, and Firefox ESR \u003c 102.7.\n\n * CVE-2023-23606: Memory safety bugs present in Firefox 108. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 109.\n\n * CVE-2023-25728: The \u003ccode\u003eContent-Security-Policy-Report-Only\u003c/code\u003e header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25729: Permission prompts for opening external schemes were only shown for \u003ccode\u003eContentPrincipals\u003c/code\u003e resulting in extensions being able to open them without user interaction via \u003ccode\u003eExpandedPrincipals\u003c/code\u003e. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25730: A background script invoking \u003ccode\u003erequestFullscreen\u003c/code\u003e and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25731: Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox \u003c 110.\n\n * CVE-2023-25732: When encoding data from an \u003ccode\u003einputStream\u003c/code\u003e in \u003ccode\u003expcom\u003c/code\u003e the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25733: The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox \u003c 110.\n\n * CVE-2023-25735: Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25736: An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox \u003c 110.\n\n * CVE-2023-25737: An invalid downcast from \u003ccode\u003ensTextNode\u003c/code\u003e to \u003ccode\u003eSVGElement\u003c/code\u003e could have lead to undefined behavior. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25739: Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in \u003ccode\u003eScriptLoadContext\u003c/code\u003e. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25740: After downloading a Windows \u003ccode\u003e.scf\u003c/code\u003e script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.\u003cbr\u003e*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 110.\n\n * CVE-2023-25741: When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox \u003c 110.\n\n * CVE-2023-25742: When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25744: Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 110 and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25745: Memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 110.\n\n * CVE-2023-25750: Under certain circumstances, a ServiceWorker's offline cache may have leaked to the file system when using private browsing mode. This vulnerability affects Firefox \u003c 111.\n\n * CVE-2023-25751: Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox \u003c 111, Firefox ESR \u003c 102.9, and Thunderbird \u003c 102.9.\n\n * CVE-2023-25752: When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox \u003c 111, Firefox ESR \u003c 102.9, and Thunderbird \u003c 102.9.\n\n * CVE-2023-28159: The fullscreen notification could have been hidden on Firefox for Android by using download popups, resulting in potential user confusion or spoofing attacks. \u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 111.\n\n * CVE-2023-28160: When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox \u003c 111.\n\n * CVE-2023-28161: If temporary \"one-time\" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL. This is potentially dangerous if the local files came from different sources, such as in a download directory. This vulnerability affects Firefox \u003c 111.\n\n * CVE-2023-28162: While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox \u003c 111, Firefox ESR \u003c 102.9, and Thunderbird \u003c 102.9.\n\n * CVE-2023-28163: When downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the context of the current user. \u003cbr\u003e*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox \u003c 111, Firefox ESR \u003c 102.9, and Thunderbird \u003c 102.9.\n\n * CVE-2023-28164: Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. This vulnerability affects Firefox \u003c 111, Firefox ESR \u003c 102.9, and Thunderbird \u003c 102.9.\n\n * CVE-2023-28176: Memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 111, Firefox ESR \u003c 102.9, and Thunderbird \u003c 102.9.\n\n * CVE-2023-28177: Memory safety bugs present in Firefox 110. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 111.\n\n * CVE-2023-29533: A website could have obscured the fullscreen notification by using a combination of \u003ccode\u003ewindow.open\u003c/code\u003e, fullscreen requests, \u003ccode\u003ewindow.name\u003c/code\u003e assignments, and \u003ccode\u003esetInterval\u003c/code\u003e calls. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29535: Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29536: An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29537: Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29538: Under specific circumstances a WebExtension may have received a \u003ccode\u003ejar:file:///\u003c/code\u003e URI instead of a \u003ccode\u003emoz-extension:///\u003c/code\u003e URI during a load request. This leaked directory paths on the user's machine. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29539: When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29540: Using a redirect embedded into \u003ccode\u003esourceMappingUrls\u003c/code\u003e could allow for navigation to external protocol links in sandboxed iframes without \u003ccode\u003eallow-top-navigation-to-custom-protocols\u003c/code\u003e. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29541: Firefox did not properly handle downloads of files ending in \u003ccode\u003e.desktop\u003c/code\u003e, which can be interpreted to run attacker-controlled commands. \u003cbr\u003e*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29543: An attacker could have caused memory corruption and a potentially exploitable use-after-free of a pointer in a global object's debugger vector. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29544: If multiple instances of resource exhaustion occurred at the incorrect time, the garbage collector could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29545: Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. \n\n*This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox \u003c 112, Firefox ESR \u003c 102.10, and Thunderbird \u003c 102.10.\n\n\n\n * CVE-2023-29547: When a secure cookie existed in the Firefox cookie jar an insecure cookie for the same domain could have been created, when it should have silently failed. This could have led to a desynchronization in expected results when reading from the secure cookie. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29548: A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29549: Under certain circumstances, a call to the \u003ccode\u003ebind\u003c/code\u003e function may have resulted in the incorrect realm. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-29550: Memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 112, Focus for Android \u003c 112, Firefox ESR \u003c 102.10, Firefox for Android \u003c 112, and Thunderbird \u003c 102.10.\n\n * CVE-2023-29551: Memory safety bugs present in Firefox 111. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.\n\n * CVE-2023-32205: In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32206: An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32207: A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32208: Service workers could reveal script base URL due to dynamic `import()`. This vulnerability affects Firefox \u003c 113.\n\n * CVE-2023-32209: A maliciously crafted favicon could have led to an out of memory crash. This vulnerability affects Firefox \u003c 113.\n\n * CVE-2023-32210: Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended. This vulnerability affects Firefox \u003c 113.\n\n * CVE-2023-32211: A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32212: An attacker could have positioned a \u003ccode\u003edatalist\u003c/code\u003e element to obscure the address bar. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32213: When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32215: Memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 113, Firefox ESR \u003c 102.11, and Thunderbird \u003c 102.11.\n\n * CVE-2023-32216: Memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 113.\n\n\n\n * CVE-2023-34414: The error page for sites with invalid TLS certificates was missing the\nactivation-delay Firefox uses to protect prompts and permission dialogs\nfrom attacks that exploit human response time delays. If a malicious\npage elicited user clicks in precise locations immediately before\nnavigating to a site with a certificate error and made the renderer\nextremely busy at the same time, it could create a gap between when\nthe error page was loaded and when the display actually refreshed.\nWith the right timing the elicited clicks could land in that gap and \nactivate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR \u003c 102.12, Firefox \u003c 114, and Thunderbird \u003c 102.12.\n\n * CVE-2023-34415: When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an \"open redirect\". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox \u003c 114.\n\n * CVE-2023-34416: Memory safety bugs present in Firefox 113, Firefox ESR 102.11, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.12, Firefox \u003c 114, and Thunderbird \u003c 102.12.\n\n\n\n * CVE-2023-34417: Memory safety bugs present in Firefox 113. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 114.\n\n * CVE-2023-3482: When Firefox is configured to block storage of all cookies, it was still possible to store data in localstorage by using an iframe with a source of 'about:blank'. This could have led to malicious websites storing tracking data without permission. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-3600: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox \u003c 115.0.2, Firefox ESR \u003c 115.0.2, and Thunderbird \u003c 115.0.1.\n\n * CVE-2023-37201: An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. This vulnerability affects Firefox \u003c 115, Firefox ESR \u003c 102.13, and Thunderbird \u003c 102.13.\n\n * CVE-2023-37202: Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. This vulnerability affects Firefox \u003c 115, Firefox ESR \u003c 102.13, and Thunderbird \u003c 102.13.\n\n * CVE-2023-37203: Insufficient validation in the Drag and Drop API in conjunction with social engineering, may have allowed an attacker to trick end-users into creating a shortcut to local system files. This could have been leveraged to execute arbitrary code. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-37204: A website could have obscured the fullscreen notification by using an option element by introducing lag via an expensive computational function. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-37205: The use of RTL Arabic characters in the address bar may have allowed for URL spoofing. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-37206: Uploading files which contain symlinks may have allowed an attacker to trick a user into submitting sensitive data to a malicious website. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-37207: A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 115, Firefox ESR \u003c 102.13, and Thunderbird \u003c 102.13.\n\n * CVE-2023-37208: When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code. This vulnerability affects Firefox \u003c 115, Firefox ESR \u003c 102.13, and Thunderbird \u003c 102.13.\n\n * CVE-2023-37209: A use-after-free condition existed in `NotifyOnHistoryReload` where a `LoadingSessionHistoryEntry` object was freed and a reference to that object remained. This resulted in a potentially exploitable condition when the reference to that object was later reused. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-37210: A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-37211: Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 115, Firefox ESR \u003c 102.13, and Thunderbird \u003c 102.13.\n\n * CVE-2023-37212: Memory safety bugs present in Firefox 114. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 115.\n\n * CVE-2023-4045: Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4046: In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4047: A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4048: An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4049: Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4050: In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4051: A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4052: The Firefox updater created a directory writable by non-privileged users. When uninstalling Firefox, any files in that directory would be recursively deleted with the permissions of the uninstalling user account. This could be combined with creation of a junction (a form of symbolic link) to allow arbitrary file deletion controlled by the non-privileged user. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 115.1, and Thunderbird \u003c 115.1.\n\n * CVE-2023-4053: A website could have obscured the full screen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4054: When opening appref-ms files, Firefox did not warn the user that these files may contain malicious code. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, Firefox ESR \u003c 115.1, Thunderbird \u003c 102.14, and Thunderbird \u003c 115.1.\n\n * CVE-2023-4055: When the number of cookies per domain was exceeded in `document.cookie`, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. This could have caused requests to be sent with some cookies missing. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4056: Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 102.14, and Firefox ESR \u003c 115.1.\n\n * CVE-2023-4057: Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and Thunderbird 115.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 116, Firefox ESR \u003c 115.1, and Thunderbird \u003c 115.1.\n\n * CVE-2023-4573: When receiving rendering data over IPC `mStream` could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 102.15, Firefox ESR \u003c 115.2, Thunderbird \u003c 102.15, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4574: When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 102.15, Firefox ESR \u003c 115.2, Thunderbird \u003c 102.15, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4575: When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 102.15, Firefox ESR \u003c 115.2, Thunderbird \u003c 102.15, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4576: On Windows, an integer overflow could occur in `RecordedSourceSurfaceCreation` which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape.\n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 102.15, Firefox ESR \u003c 115.2, Thunderbird \u003c 102.15, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4577: When `UpdateRegExpStatics` attempted to access `initialStringHeap` it could already have been garbage collected prior to entering the function, which could potentially have led to an exploitable crash. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4578: When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4580: Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4581: Excel `.xll` add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 102.15, Firefox ESR \u003c 115.2, Thunderbird \u003c 102.15, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4582: Due to large allocation checks in Angle for glsl shaders being too lenient a buffer overflow could have occured when allocating too much private shader memory on mac OS. \n*This bug only affects Firefox on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4583: When checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4584: Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 102.15, Firefox ESR \u003c 115.2, Thunderbird \u003c 102.15, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4585: Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.2, and Thunderbird \u003c 115.2.\n\n * CVE-2023-4863: Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)\n\n * CVE-2023-5168: A compromised content process could have provided malicious data to `FilterNodeD2D1` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.\n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 118, Firefox ESR \u003c 115.3, and Thunderbird \u003c 115.3.\n\n * CVE-2023-5169: A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox \u003c 118, Firefox ESR \u003c 115.3, and Thunderbird \u003c 115.3.\n\n * CVE-2023-5171: During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox \u003c 118, Firefox ESR \u003c 115.3, and Thunderbird \u003c 115.3.\n\n * CVE-2023-5174: If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.\n*This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 118, Firefox ESR \u003c 115.3, and Thunderbird \u003c 115.3.\n\n * CVE-2023-5176: Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 118, Firefox ESR \u003c 115.3, and Thunderbird \u003c 115.3.\n\n * CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-5721: It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5724: Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5725: A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5726: A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks. \n*Note: This issue only affected macOS operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5727: The executable file warning was not presented when downloading .msix, .msixbundle, .appx, and .appxbundle files, which can run commands on a user's computer. \n*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5728: During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5730: Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 119, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-5732: An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox \u003c 117, Firefox ESR \u003c 115.4, and Thunderbird \u003c 115.4.1.\n\n * CVE-2023-6204: On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6205: It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6206: The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6207: Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6208: When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.\n*This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6209: Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal \"/../\" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6212: Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 120, Firefox ESR \u003c 115.5.0, and Thunderbird \u003c 115.5.\n\n * CVE-2023-6856: The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6857: When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. \n*This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6858: Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6859: A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6860: The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6861: The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6862: A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. This vulnerability affects Firefox ESR \u003c 115.6 and Thunderbird \u003c 115.6.\n\n * CVE-2023-6863: The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6864: Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 115.6, Thunderbird \u003c 115.6, and Firefox \u003c 121.\n\n * CVE-2023-6865: `EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR \u003c 115.6 and Firefox \u003c 121.\n\n * CVE-2023-6867: The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR \u003c 115.6 and Firefox \u003c 121.\n\n * CVE-2024-0741: An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0742: It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0746: A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0747: When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0749: A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox \u003c 122 and Thunderbird \u003c 115.7.\n\n * CVE-2024-0750: A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0751: A malicious devtools extension could have been used to escalate privileges. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0753: In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-0755: Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 122, Firefox ESR \u003c 115.7, and Thunderbird \u003c 115.7.\n\n * CVE-2024-1546: When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1547: Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1548: A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1549: If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1550: A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1551: Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1552: Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * CVE-2024-1553: Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 123, Firefox ESR \u003c 115.8, and Thunderbird \u003c 115.8.\n\n * #43516: Прошу добавить поисковую систему Яндекс в браузер Mozilla Firefox\n\n * #47960: Новая версия Firefox-esr больше не берет настройки из /etc/firefox/pref (нужно пересобрать пакет)", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Critical", + "Rights": "Copyright 2024 BaseALT Ltd.", + "Issued": { + "Date": "2024-03-07" + }, + "Updated": { + "Date": "2024-03-07" + }, + "bdu": [ + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-04769", + "Impact": "High", + "Public": "20220726", + "CveID": "BDU:2022-04769" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-04776", + "Impact": "High", + "Public": "20220726", + "CveID": "BDU:2022-04776" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-120", + "Href": "https://bdu.fstec.ru/vul/2022-05446", + "Impact": "High", + "Public": "20220823", + "CveID": "BDU:2022-05446" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-120", + "Href": "https://bdu.fstec.ru/vul/2022-05447", + "Impact": "High", + "Public": "20220823", + "CveID": "BDU:2022-05447" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2022-05497", + "Impact": "High", + "Public": "20220823", + "CveID": "BDU:2022-05497" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-20", + "Href": "https://bdu.fstec.ru/vul/2022-05560", + "Impact": "Low", + "Public": "20220823", + "CveID": "BDU:2022-05560" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-356", + "Href": "https://bdu.fstec.ru/vul/2022-05566", + "Impact": "High", + "Public": "20220823", + "CveID": "BDU:2022-05566" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2022-06049", + "Impact": "High", + "Public": "20220920", + "CveID": "BDU:2022-06049" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2022-06107", + "Impact": "Low", + "Public": "20220726", + "CveID": "BDU:2022-06107" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-399", + "Href": "https://bdu.fstec.ru/vul/2022-06109", + "Impact": "Low", + "Public": "20220726", + "CveID": "BDU:2022-06109" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://bdu.fstec.ru/vul/2022-06141", + "Impact": "Low", + "Public": "20220726", + "CveID": "BDU:2022-06141" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-208", + "Href": "https://bdu.fstec.ru/vul/2022-06186", + "Impact": "Low", + "Public": "20220726", + "CveID": "BDU:2022-06186" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-254, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2022-06198", + "Impact": "Low", + "Public": "20220920", + "CveID": "BDU:2022-06198" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", + "Cwe": "CWE-20, CWE-240", + "Href": "https://bdu.fstec.ru/vul/2022-06205", + "Impact": "Low", + "Public": "20220920", + "CveID": "BDU:2022-06205" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-254, CWE-784", + "Href": "https://bdu.fstec.ru/vul/2022-06240", + "Impact": "Low", + "Public": "20220920", + "CveID": "BDU:2022-06240" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2022-06252", + "Impact": "High", + "Public": "20220920", + "CveID": "BDU:2022-06252" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-254, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2022-06253", + "Impact": "High", + "Public": "20220920", + "CveID": "BDU:2022-06253" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", + "Cwe": "CWE-399, CWE-400", + "Href": "https://bdu.fstec.ru/vul/2022-06516", + "Impact": "High", + "Public": "20221018", + "CveID": "BDU:2022-06516" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2022-06517", + "Impact": "High", + "Public": "20221018", + "CveID": "BDU:2022-06517" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-254, CWE-829", + "Href": "https://bdu.fstec.ru/vul/2022-06518", + "Impact": "High", + "Public": "20221018", + "CveID": "BDU:2022-06518" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2022-06814", + "Impact": "Critical", + "Public": "20221115", + "CveID": "BDU:2022-06814" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2022-06815", + "Impact": "Critical", + "Public": "20221115", + "CveID": "BDU:2022-06815" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2022-06816", + "Impact": "Critical", + "Public": "20221115", + "CveID": "BDU:2022-06816" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2022-06817", + "Impact": "Critical", + "Public": "20221115", + "CveID": "BDU:2022-06817" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2022-06818", + "Impact": "Critical", + "Public": "20221115", + "CveID": "BDU:2022-06818" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-06873", + "Impact": "High", + "Public": "20221115", + "CveID": "BDU:2022-06873" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-200, CWE-829", + "Href": "https://bdu.fstec.ru/vul/2022-06961", + "Impact": "High", + "Public": "20221115", + "CveID": "BDU:2022-06961" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-254, CWE-1275", + "Href": "https://bdu.fstec.ru/vul/2022-07016", + "Impact": "Low", + "Public": "20221115", + "CveID": "BDU:2022-07016" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2022-07019", + "Impact": "Low", + "Public": "20221018", + "CveID": "BDU:2022-07019" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2022-07061", + "Impact": "Low", + "Public": "20221115", + "CveID": "BDU:2022-07061" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-362", + "Href": "https://bdu.fstec.ru/vul/2022-07066", + "Impact": "High", + "Public": "20221018", + "CveID": "BDU:2022-07066" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-312", + "Href": "https://bdu.fstec.ru/vul/2022-07068", + "Impact": "High", + "Public": "20221018", + "CveID": "BDU:2022-07068" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://bdu.fstec.ru/vul/2022-07069", + "Impact": "Low", + "Public": "20221115", + "CveID": "BDU:2022-07069" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2022-07070", + "Impact": "Low", + "Public": "20221115", + "CveID": "BDU:2022-07070" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2022-07071", + "Impact": "Low", + "Public": "20221115", + "CveID": "BDU:2022-07071" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-00046", + "Impact": "High", + "Public": "20221213", + "CveID": "BDU:2023-00046" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-00060", + "Impact": "High", + "Public": "20221115", + "CveID": "BDU:2023-00060" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-200, CWE-265", + "Href": "https://bdu.fstec.ru/vul/2023-00074", + "Impact": "High", + "Public": "20221213", + "CveID": "BDU:2023-00074" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2023-00369", + "Impact": "Low", + "Public": "20230117", + "CveID": "BDU:2023-00369" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-00384", + "Impact": "Low", + "Public": "20221222", + "CveID": "BDU:2023-00384" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-00385", + "Impact": "High", + "Public": "20221222", + "CveID": "BDU:2023-00385" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-00538", + "Impact": "High", + "Public": "20230117", + "CveID": "BDU:2023-00538" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2023-00597", + "Impact": "High", + "Public": "20230117", + "CveID": "BDU:2023-00597" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-00598", + "Impact": "High", + "Public": "20230117", + "CveID": "BDU:2023-00598" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-450", + "Href": "https://bdu.fstec.ru/vul/2023-00602", + "Impact": "High", + "Public": "20230117", + "CveID": "BDU:2023-00602" + }, + { + "Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-01262", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01262" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-173", + "Href": "https://bdu.fstec.ru/vul/2023-01263", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01263" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-704", + "Href": "https://bdu.fstec.ru/vul/2023-01264", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01264" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-01265", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01265" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-01266", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01266" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-01267", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01267" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-01269", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01269" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-01270", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01270" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-84", + "Href": "https://bdu.fstec.ru/vul/2023-01271", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01271" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-01272", + "Impact": "High", + "Public": "20230215", + "CveID": "BDU:2023-01272" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "Cwe": "CWE-264", + "Href": "https://bdu.fstec.ru/vul/2023-01452", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01452" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L", + "Cwe": "CWE-200, CWE-610", + "Href": "https://bdu.fstec.ru/vul/2023-01556", + "Impact": "Low", + "Public": "20230314", + "CveID": "BDU:2023-01556" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:P/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:H", + "Cwe": "CWE-200", + "Href": "https://bdu.fstec.ru/vul/2023-01557", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01557" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-01558", + "Impact": "Low", + "Public": "20230314", + "CveID": "BDU:2023-01558" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-01559", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01559" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-01560", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01560" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-94", + "Href": "https://bdu.fstec.ru/vul/2023-01561", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01561" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-451, CWE-829", + "Href": "https://bdu.fstec.ru/vul/2023-01562", + "Impact": "Low", + "Public": "20230314", + "CveID": "BDU:2023-01562" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "Cwe": "CWE-704", + "Href": "https://bdu.fstec.ru/vul/2023-01563", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01563" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-200", + "Href": "https://bdu.fstec.ru/vul/2023-01803", + "Impact": "Low", + "Public": "20230314", + "CveID": "BDU:2023-01803" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-01807", + "Impact": "High", + "Public": "20230314", + "CveID": "BDU:2023-01807" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-763", + "Href": "https://bdu.fstec.ru/vul/2023-02676", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02676" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-02677", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02677" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-02678", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02678" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2023-02689", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02689" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-02691", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02691" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-200", + "Href": "https://bdu.fstec.ru/vul/2023-02692", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02692" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-1037", + "Href": "https://bdu.fstec.ru/vul/2023-02693", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02693" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-254, CWE-476", + "Href": "https://bdu.fstec.ru/vul/2023-02694", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-02694" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-02783", + "Impact": "Low", + "Public": "20221222", + "CveID": "BDU:2023-02783" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-02803", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02803" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-02804", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02804" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-02805", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02805" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "Cwe": "CWE-843", + "Href": "https://bdu.fstec.ru/vul/2023-02806", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02806" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-02807", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02807" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-264", + "Href": "https://bdu.fstec.ru/vul/2023-02808", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02808" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-02809", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02809" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-200", + "Href": "https://bdu.fstec.ru/vul/2023-02811", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02811" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "Cwe": "CWE-400", + "Href": "https://bdu.fstec.ru/vul/2023-02812", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02812" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-02813", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02813" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-254, CWE-275", + "Href": "https://bdu.fstec.ru/vul/2023-02814", + "Impact": "Low", + "Public": "20230509", + "CveID": "BDU:2023-02814" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-03004", + "Impact": "Low", + "Public": "20230411", + "CveID": "BDU:2023-03004" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-03125", + "Impact": "High", + "Public": "20230606", + "CveID": "BDU:2023-03125" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-03196", + "Impact": "Low", + "Public": "20230606", + "CveID": "BDU:2023-03196" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-601", + "Href": "https://bdu.fstec.ru/vul/2023-03197", + "Impact": "Low", + "Public": "20230606", + "CveID": "BDU:2023-03197" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-03198", + "Impact": "High", + "Public": "20230606", + "CveID": "BDU:2023-03198" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2023-03686", + "Impact": "High", + "Public": "20230602", + "CveID": "BDU:2023-03686" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-03964", + "Impact": "High", + "Public": "20230720", + "CveID": "BDU:2023-03964" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-04015", + "Impact": "Low", + "Public": "20230705", + "CveID": "BDU:2023-04015" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-04016", + "Impact": "Low", + "Public": "20230705", + "CveID": "BDU:2023-04016" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-862", + "Href": "https://bdu.fstec.ru/vul/2023-04017", + "Impact": "Low", + "Public": "20230705", + "CveID": "BDU:2023-04017" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-04018", + "Impact": "High", + "Public": "20230713", + "CveID": "BDU:2023-04018" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-04019", + "Impact": "Low", + "Public": "20230713", + "CveID": "BDU:2023-04019" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-04020", + "Impact": "High", + "Public": "20230713", + "CveID": "BDU:2023-04020" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-04021", + "Impact": "High", + "Public": "20230705", + "CveID": "BDU:2023-04021" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-04022", + "Impact": "Low", + "Public": "20230704", + "CveID": "BDU:2023-04022" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-04023", + "Impact": "High", + "Public": "20230705", + "CveID": "BDU:2023-04023" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-04024", + "Impact": "High", + "Public": "20230705", + "CveID": "BDU:2023-04024" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-04025", + "Impact": "High", + "Public": "20230713", + "CveID": "BDU:2023-04025" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-20, CWE-77", + "Href": "https://bdu.fstec.ru/vul/2023-04026", + "Impact": "High", + "Public": "20230705", + "CveID": "BDU:2023-04026" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-04325", + "Impact": "Critical", + "Public": "20230801", + "CveID": "BDU:2023-04325" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-942", + "Href": "https://bdu.fstec.ru/vul/2023-04326", + "Impact": "Critical", + "Public": "20230801", + "CveID": "BDU:2023-04326" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-404", + "Href": "https://bdu.fstec.ru/vul/2023-04327", + "Impact": "Low", + "Public": "20230801", + "CveID": "BDU:2023-04327" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-04439", + "Impact": "High", + "Public": "20230801", + "CveID": "BDU:2023-04439" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-371", + "Href": "https://bdu.fstec.ru/vul/2023-04440", + "Impact": "Low", + "Public": "20230801", + "CveID": "BDU:2023-04440" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-04441", + "Impact": "High", + "Public": "20230801", + "CveID": "BDU:2023-04441" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-04442", + "Impact": "High", + "Public": "20230801", + "CveID": "BDU:2023-04442" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120, CWE-121", + "Href": "https://bdu.fstec.ru/vul/2023-04443", + "Impact": "High", + "Public": "20230801", + "CveID": "BDU:2023-04443" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-275, CWE-280", + "Href": "https://bdu.fstec.ru/vul/2023-04444", + "Impact": "High", + "Public": "20230801", + "CveID": "BDU:2023-04444" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-04498", + "Impact": "Low", + "Public": "20230801", + "CveID": "BDU:2023-04498" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-275, CWE-276", + "Href": "https://bdu.fstec.ru/vul/2023-04499", + "Impact": "Low", + "Public": "20230801", + "CveID": "BDU:2023-04499" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-04802", + "Impact": "High", + "Public": "20211017", + "CveID": "BDU:2023-04802" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-74", + "Href": "https://bdu.fstec.ru/vul/2023-04816", + "Impact": "High", + "Public": "20200610", + "CveID": "BDU:2023-04816" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-222", + "Href": "https://bdu.fstec.ru/vul/2023-04817", + "Impact": "High", + "Public": "20211214", + "CveID": "BDU:2023-04817" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-04818", + "Impact": "High", + "Public": "20220729", + "CveID": "BDU:2023-04818" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-04821", + "Impact": "High", + "Public": "20221024", + "CveID": "BDU:2023-04821" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-942", + "Href": "https://bdu.fstec.ru/vul/2023-04822", + "Impact": "Low", + "Public": "20230126", + "CveID": "BDU:2023-04822" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-704", + "Href": "https://bdu.fstec.ru/vul/2023-04823", + "Impact": "Critical", + "Public": "20230214", + "CveID": "BDU:2023-04823" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-252", + "Href": "https://bdu.fstec.ru/vul/2023-04824", + "Impact": "High", + "Public": "20230214", + "CveID": "BDU:2023-04824" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-404", + "Href": "https://bdu.fstec.ru/vul/2023-04825", + "Impact": "High", + "Public": "20221120", + "CveID": "BDU:2023-04825" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-185", + "Href": "https://bdu.fstec.ru/vul/2023-04827", + "Impact": "Low", + "Public": "20221115", + "CveID": "BDU:2023-04827" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-754", + "Href": "https://bdu.fstec.ru/vul/2023-04828", + "Impact": "Low", + "Public": "20221116", + "CveID": "BDU:2023-04828" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-346", + "Href": "https://bdu.fstec.ru/vul/2023-04829", + "Impact": "Low", + "Public": "20221008", + "CveID": "BDU:2023-04829" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-05101", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05101" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-05102", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05102" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-05173", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05173" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-05174", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05174" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-05175", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05175" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-05176", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05176" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-190", + "Href": "https://bdu.fstec.ru/vul/2023-05177", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05177" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-313", + "Href": "https://bdu.fstec.ru/vul/2023-05178", + "Impact": "Low", + "Public": "20230829", + "CveID": "BDU:2023-05178" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "Cwe": "CWE-400", + "Href": "https://bdu.fstec.ru/vul/2023-05179", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05179" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-05180", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05180" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-05181", + "Impact": "High", + "Public": "20230829", + "CveID": "BDU:2023-05181" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-200", + "Href": "https://bdu.fstec.ru/vul/2023-05182", + "Impact": "Low", + "Public": "20230829", + "CveID": "BDU:2023-05182" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-05510", + "Impact": "High", + "Public": "20230911", + "CveID": "BDU:2023-05510" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-05886", + "Impact": "Critical", + "Public": "20230824", + "CveID": "BDU:2023-05886" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-05888", + "Impact": "High", + "Public": "20220407", + "CveID": "BDU:2023-05888" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-362", + "Href": "https://bdu.fstec.ru/vul/2023-05889", + "Impact": "High", + "Public": "20230320", + "CveID": "BDU:2023-05889" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-668", + "Href": "https://bdu.fstec.ru/vul/2023-05890", + "Impact": "Low", + "Public": "20210106", + "CveID": "BDU:2023-05890" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-601", + "Href": "https://bdu.fstec.ru/vul/2023-05891", + "Impact": "Low", + "Public": "20220912", + "CveID": "BDU:2023-05891" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-05892", + "Impact": "High", + "Public": "20230210", + "CveID": "BDU:2023-05892" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-400", + "Href": "https://bdu.fstec.ru/vul/2023-05893", + "Impact": "Low", + "Public": "20230224", + "CveID": "BDU:2023-05893" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-326", + "Href": "https://bdu.fstec.ru/vul/2023-05894", + "Impact": "Low", + "Public": "20230317", + "CveID": "BDU:2023-05894" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "Cwe": "CWE-122", + "Href": "https://bdu.fstec.ru/vul/2023-06157", + "Impact": "Critical", + "Public": "20230928", + "CveID": "BDU:2023-06157" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-06372", + "Impact": "Critical", + "Public": "20230926", + "CveID": "BDU:2023-06372" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-74, CWE-77, CWE-707", + "Href": "https://bdu.fstec.ru/vul/2023-07184", + "Impact": "Low", + "Public": "20230117", + "CveID": "BDU:2023-07184" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-07235", + "Impact": "Critical", + "Public": "20230927", + "CveID": "BDU:2023-07235" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "Cwe": "CWE-399, CWE-404, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-07278", + "Impact": "High", + "Public": "20231024", + "CveID": "BDU:2023-07278" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-200, CWE-264, CWE-601", + "Href": "https://bdu.fstec.ru/vul/2023-07279", + "Impact": "Low", + "Public": "20231024", + "CveID": "BDU:2023-07279" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-356, CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-07280", + "Impact": "High", + "Public": "20231024", + "CveID": "BDU:2023-07280" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-07281", + "Impact": "High", + "Public": "20231024", + "CveID": "BDU:2023-07281" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-254, CWE-357", + "Href": "https://bdu.fstec.ru/vul/2023-07282", + "Impact": "Low", + "Public": "20231024", + "CveID": "BDU:2023-07282" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-119, CWE-401", + "Href": "https://bdu.fstec.ru/vul/2023-07283", + "Impact": "Low", + "Public": "20231024", + "CveID": "BDU:2023-07283" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-356, CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-07284", + "Impact": "Low", + "Public": "20231024", + "CveID": "BDU:2023-07284" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-450, CWE-451", + "Href": "https://bdu.fstec.ru/vul/2023-07285", + "Impact": "Low", + "Public": "20231024", + "CveID": "BDU:2023-07285" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-07665", + "Impact": "Low", + "Public": "20230926", + "CveID": "BDU:2023-07665" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-07671", + "Impact": "Low", + "Public": "20230926", + "CveID": "BDU:2023-07671" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-08086", + "Impact": "High", + "Public": "20231120", + "CveID": "BDU:2023-08086" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-08087", + "Impact": "High", + "Public": "20231120", + "CveID": "BDU:2023-08087" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2023-08088", + "Impact": "Low", + "Public": "20231120", + "CveID": "BDU:2023-08088" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-120", + "Href": "https://bdu.fstec.ru/vul/2023-08115", + "Impact": "High", + "Public": "20231120", + "CveID": "BDU:2023-08115" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-08116", + "Impact": "High", + "Public": "20231120", + "CveID": "BDU:2023-08116" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-22", + "Href": "https://bdu.fstec.ru/vul/2023-08322", + "Impact": "Low", + "Public": "20231121", + "CveID": "BDU:2023-08322" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119, CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-08332", + "Impact": "High", + "Public": "20231121", + "CveID": "BDU:2023-08332" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-450", + "Href": "https://bdu.fstec.ru/vul/2023-09018", + "Impact": "Low", + "Public": "20231219", + "CveID": "BDU:2023-09018" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-124", + "Href": "https://bdu.fstec.ru/vul/2023-09031", + "Impact": "Low", + "Public": "20231219", + "CveID": "BDU:2023-09031" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2023-09055", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09055" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2023-09058", + "Impact": "Low", + "Public": "20231219", + "CveID": "BDU:2023-09058" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-457", + "Href": "https://bdu.fstec.ru/vul/2023-09059", + "Impact": "Low", + "Public": "20231219", + "CveID": "BDU:2023-09059" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-09062", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09062" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-09099", + "Impact": "Low", + "Public": "20220110", + "CveID": "BDU:2023-09099" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-122", + "Href": "https://bdu.fstec.ru/vul/2023-09115", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09115" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-09116", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09116" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-122", + "Href": "https://bdu.fstec.ru/vul/2023-09117", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09117" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-758", + "Href": "https://bdu.fstec.ru/vul/2023-09118", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09118" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-122", + "Href": "https://bdu.fstec.ru/vul/2023-09119", + "Impact": "High", + "Public": "20231219", + "CveID": "BDU:2023-09119" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "Cwe": "CWE-200, CWE-254", + "Href": "https://bdu.fstec.ru/vul/2024-00730", + "Impact": "Low", + "Public": "20240126", + "CveID": "BDU:2024-00730" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2024-00803", + "Impact": "High", + "Public": "20240123", + "CveID": "BDU:2024-00803" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "Cwe": "CWE-264", + "Href": "https://bdu.fstec.ru/vul/2024-00805", + "Impact": "Low", + "Public": "20240123", + "CveID": "BDU:2024-00805" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2024-00807", + "Impact": "Low", + "Public": "20240123", + "CveID": "BDU:2024-00807" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2024-00808", + "Impact": "High", + "Public": "20240123", + "CveID": "BDU:2024-00808" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "Cwe": "CWE-617", + "Href": "https://bdu.fstec.ru/vul/2024-00810", + "Impact": "Low", + "Public": "20240123", + "CveID": "BDU:2024-00810" + }, + { + "Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "Cwe": "CWE-254", + "Href": "https://bdu.fstec.ru/vul/2024-00812", + "Impact": "Low", + "Public": "20240123", + "CveID": "BDU:2024-00812" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-357", + "Href": "https://bdu.fstec.ru/vul/2024-00813", + "Impact": "Low", + "Public": "20240123", + "CveID": "BDU:2024-00813" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-264", + "Href": "https://bdu.fstec.ru/vul/2024-00814", + "Impact": "Low", + "Public": "20240123", + "CveID": "BDU:2024-00814" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "Cwe": "CWE-451", + "Href": "https://bdu.fstec.ru/vul/2024-01619", + "Impact": "Low", + "Public": "20240220", + "CveID": "BDU:2024-01619" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2024-01659", + "Impact": "Low", + "Public": "20240220", + "CveID": "BDU:2024-01659" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2024-01660", + "Impact": "Low", + "Public": "20240220", + "CveID": "BDU:2024-01660" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-451, CWE-1021", + "Href": "https://bdu.fstec.ru/vul/2024-01661", + "Impact": "Low", + "Public": "20240220", + "CveID": "BDU:2024-01661" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2024-01662", + "Impact": "High", + "Public": "20240220", + "CveID": "BDU:2024-01662" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-74", + "Href": "https://bdu.fstec.ru/vul/2024-01663", + "Impact": "Low", + "Public": "20240220", + "CveID": "BDU:2024-01663" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-681", + "Href": "https://bdu.fstec.ru/vul/2024-01664", + "Impact": "Low", + "Public": "20240220", + "CveID": "BDU:2024-01664" + } + ], + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2505", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-2505" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-125", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3266", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-3266" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36315", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-36315" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-601", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36316", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-36316" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-362", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36318", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-36318" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36319", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-36319" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36320", + "Impact": "Critical", + "Public": "20221222", + "CveID": "CVE-2022-36320" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-346", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38472", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-38472" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-281", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38473", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-38473" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-863", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38475", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-38475" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38477", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-38477" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38478", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-38478" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40956", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-40956" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40957", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-40957" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-74", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40958", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-40958" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-922", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40959", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-40959" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40960", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-40960" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40962", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-40962" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "Cwe": "CWE-346", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42927", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-42927" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-476", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42928", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-42928" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42929", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-42929" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-362", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42930", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-42930" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-312", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42931", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-42931" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42932", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-42932" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-203", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45403", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45403" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-Other", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45404", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45404" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45405", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45405" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45406", + "Impact": "Critical", + "Public": "20221222", + "CveID": "CVE-2022-45406" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45407", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-45407" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-Other", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45408", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45408" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45409", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-45409" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45410", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45410" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45411", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45411" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45415", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-45415" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-203", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45416", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45416" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-1021", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45417", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45417" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-1021", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45418", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45418" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-295", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45419", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45419" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-1021", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45420", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-45420" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45421", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-45421" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46871", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46871" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46872", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46872" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-74", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46873", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46873" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46874", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46874" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46877", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-46877" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46878", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46878" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46879", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46879" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46880", + "Impact": "Low", + "Public": "20221222", + "CveID": "CVE-2022-46880" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46881", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46881" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46882", + "Impact": "Critical", + "Public": "20221222", + "CveID": "CVE-2022-46882" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46883", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46883" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46884", + "Impact": "High", + "Public": "20230824", + "CveID": "CVE-2022-46884" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46885", + "Impact": "High", + "Public": "20221222", + "CveID": "CVE-2022-46885" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0767", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-0767" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-326", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23597", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23597" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23598", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23598" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-116", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23599", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23599" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-346", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23601", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23601" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-754", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23602", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23602" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23603", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23603" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23604", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-23604" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23605", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-23605" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23606", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-23606" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25728", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25728" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25729", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25729" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25730", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25730" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25731", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25731" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25732", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25732" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-252", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25733", + "Impact": "High", + "Public": "20230619", + "CveID": "CVE-2023-25733" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25735", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25735" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25736", + "Impact": "Critical", + "Public": "20230619", + "CveID": "CVE-2023-25736" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25737", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25737" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25739", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25739" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25740", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25740" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25741", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25741" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25742", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25742" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25744", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25744" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25745", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-25745" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-668", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25750", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25750" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25751", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25751" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25752", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-25752" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28159", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-28159" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28160", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-28160" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-281", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28161", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-28161" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-704", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28162", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-28162" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28163", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-28163" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28164", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-28164" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28176", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-28176" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28177", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-28177" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29533", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29533" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29535", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29535" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29536", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29536" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-362", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29537", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29537" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-668", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29538", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29538" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-476", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29539", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29539" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-601", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29540", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29540" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-116", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29541", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29541" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29543", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29543" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-400", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29544", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29544" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29545", + "Impact": "Low", + "Public": "20230619", + "CveID": "CVE-2023-29545" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29547", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29547" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29548", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29548" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-326", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29549", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-29549" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29550", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29550" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29551", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-29551" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32205", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-32205" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-125", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32206", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-32206" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-290", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32207", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-32207" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32208", + "Impact": "Low", + "Public": "20230619", + "CveID": "CVE-2023-32208" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32209", + "Impact": "High", + "Public": "20230619", + "CveID": "CVE-2023-32209" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32210", + "Impact": "Low", + "Public": "20230619", + "CveID": "CVE-2023-32210" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32211", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-32211" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32212", + "Impact": "Low", + "Public": "20230602", + "CveID": "CVE-2023-32212" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-908", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32213", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-32213" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32215", + "Impact": "High", + "Public": "20230602", + "CveID": "CVE-2023-32215" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32216", + "Impact": "Critical", + "Public": "20230619", + "CveID": "CVE-2023-32216" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "Cwe": "CWE-295", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34414", + "Impact": "Low", + "Public": "20230619", + "CveID": "CVE-2023-34414" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-601", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34415", + "Impact": "Low", + "Public": "20230619", + "CveID": "CVE-2023-34415" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34416", + "Impact": "Critical", + "Public": "20230619", + "CveID": "CVE-2023-34416" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34417", + "Impact": "Critical", + "Public": "20230619", + "CveID": "CVE-2023-34417" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-862", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3482", + "Impact": "Low", + "Public": "20230705", + "CveID": "CVE-2023-3482" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3600", + "Impact": "High", + "Public": "20230712", + "CveID": "CVE-2023-3600" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37201", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37201" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37202", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37202" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37203", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37203" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37204", + "Impact": "Low", + "Public": "20230705", + "CveID": "CVE-2023-37204" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37205", + "Impact": "Low", + "Public": "20230705", + "CveID": "CVE-2023-37205" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-59", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37206", + "Impact": "Low", + "Public": "20230705", + "CveID": "CVE-2023-37206" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-470", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37207", + "Impact": "Low", + "Public": "20230705", + "CveID": "CVE-2023-37207" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37208", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37208" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37209", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37209" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37210", + "Impact": "Low", + "Public": "20230705", + "CveID": "CVE-2023-37210" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37211", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37211" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37212", + "Impact": "High", + "Public": "20230705", + "CveID": "CVE-2023-37212" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-346", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4045", + "Impact": "Low", + "Public": "20230801", + "CveID": "CVE-2023-4045" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4046", + "Impact": "Low", + "Public": "20230801", + "CveID": "CVE-2023-4046" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4047", + "Impact": "High", + "Public": "20230801", + "CveID": "CVE-2023-4047" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-125", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4048", + "Impact": "High", + "Public": "20230801", + "CveID": "CVE-2023-4048" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-362", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4049", + "Impact": "Low", + "Public": "20230801", + "CveID": "CVE-2023-4049" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4050", + "Impact": "High", + "Public": "20230801", + "CveID": "CVE-2023-4050" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4051", + "Impact": "High", + "Public": "20230801", + "CveID": "CVE-2023-4051" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "CWE-59", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4052", + "Impact": "Low", + "Public": "20230801", + "CveID": "CVE-2023-4052" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-59", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4053", + "Impact": "Low", + "Public": "20230801", + "CveID": "CVE-2023-4053" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4054", + "Impact": "Low", + "Public": "20230801", + "CveID": "CVE-2023-4054" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4055", + "Impact": "High", + "Public": "20230801", + "CveID": "CVE-2023-4055" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4056", + "Impact": "Critical", + "Public": "20230801", + "CveID": "CVE-2023-4056" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4057", + "Impact": "Critical", + "Public": "20230801", + "CveID": "CVE-2023-4057" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4573", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4573" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4574", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4574" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4575", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4575" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "Cwe": "CWE-190", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4576", + "Impact": "High", + "Public": "20230911", + "CveID": "CVE-2023-4576" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4577", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4577" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-770", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4578", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4578" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-311", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4580", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4580" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4581", + "Impact": "Low", + "Public": "20230911", + "CveID": "CVE-2023-4581" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-120", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4582", + "Impact": "High", + "Public": "20230911", + "CveID": "CVE-2023-4582" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4583", + "Impact": "High", + "Public": "20230911", + "CveID": "CVE-2023-4583" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4584", + "Impact": "High", + "Public": "20230911", + "CveID": "CVE-2023-4584" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4585", + "Impact": "High", + "Public": "20230911", + "CveID": "CVE-2023-4585" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4863", + "Impact": "High", + "Public": "20230912", + "CveID": "CVE-2023-4863" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5168", + "Impact": "Critical", + "Public": "20230927", + "CveID": "CVE-2023-5168" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5169", + "Impact": "Low", + "Public": "20230927", + "CveID": "CVE-2023-5169" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5171", + "Impact": "Low", + "Public": "20230927", + "CveID": "CVE-2023-5171" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5174", + "Impact": "Critical", + "Public": "20230927", + "CveID": "CVE-2023-5174" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5176", + "Impact": "Critical", + "Public": "20230927", + "CveID": "CVE-2023-5176" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5217", + "Impact": "High", + "Public": "20230928", + "CveID": "CVE-2023-5217" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-1021", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5721", + "Impact": "Low", + "Public": "20231025", + "CveID": "CVE-2023-5721" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5724", + "Impact": "High", + "Public": "20231025", + "CveID": "CVE-2023-5724" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5725", + "Impact": "Low", + "Public": "20231025", + "CveID": "CVE-2023-5725" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5726", + "Impact": "Low", + "Public": "20231025", + "CveID": "CVE-2023-5726" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5727", + "Impact": "Low", + "Public": "20231025", + "CveID": "CVE-2023-5727" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5728", + "Impact": "High", + "Public": "20231025", + "CveID": "CVE-2023-5728" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5730", + "Impact": "Critical", + "Public": "20231025", + "CveID": "CVE-2023-5730" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5732", + "Impact": "Low", + "Public": "20231025", + "CveID": "CVE-2023-5732" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-125", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6204", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-6204" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6205", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-6205" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "Cwe": "CWE-1021", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6206", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-6206" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6207", + "Impact": "High", + "Public": "20231121", + "CveID": "CVE-2023-6207" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6208", + "Impact": "High", + "Public": "20231121", + "CveID": "CVE-2023-6208" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-22", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6209", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-6209" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6212", + "Impact": "High", + "Public": "20231121", + "CveID": "CVE-2023-6212" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6856", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6856" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "CWE-362", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6857", + "Impact": "Low", + "Public": "20231219", + "CveID": "CVE-2023-6857" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6858", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6858" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6859", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6859" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6860", + "Impact": "Low", + "Public": "20231219", + "CveID": "CVE-2023-6860" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6861", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6861" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6862", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6862" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6863", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6863" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6864", + "Impact": "High", + "Public": "20231219", + "CveID": "CVE-2023-6864" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6865", + "Impact": "Low", + "Public": "20231219", + "CveID": "CVE-2023-6865" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-1021", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6867", + "Impact": "Low", + "Public": "20231219", + "CveID": "CVE-2023-6867" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0741", + "Impact": "Low", + "Public": "20240123", + "CveID": "CVE-2024-0741" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0742", + "Impact": "Low", + "Public": "20240123", + "CveID": "CVE-2024-0742" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0746", + "Impact": "Low", + "Public": "20240123", + "CveID": "CVE-2024-0746" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0747", + "Impact": "Low", + "Public": "20240123", + "CveID": "CVE-2024-0747" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-346", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0749", + "Impact": "Low", + "Public": "20240123", + "CveID": "CVE-2024-0749" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0750", + "Impact": "High", + "Public": "20240123", + "CveID": "CVE-2024-0750" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-269", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0751", + "Impact": "High", + "Public": "20240123", + "CveID": "CVE-2024-0751" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0753", + "Impact": "Low", + "Public": "20240123", + "CveID": "CVE-2024-0753" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0755", + "Impact": "High", + "Public": "20240123", + "CveID": "CVE-2024-0755" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1546", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1546" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1547", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1547" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1548", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1548" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1549", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1549" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1550", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1550" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1551", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1551" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1552", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1552" + }, + { + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1553", + "Impact": "None", + "Public": "20240220", + "CveID": "CVE-2024-1553" + } + ], + "Bugzilla": [ + { + "Id": "43516", + "Href": "https://bugzilla.altlinux.org/43516", + "Data": "Прошу добавить поисковую систему Яндекс в браузер Mozilla Firefox" + }, + { + "Id": "47960", + "Href": "https://bugzilla.altlinux.org/47960", + "Data": "Новая версия Firefox-esr больше не берет настройки из /etc/firefox/pref (нужно пересобрать пакет)" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20242935001", + "Comment": "firefox-esr is earlier than 0:115.8.0-alt0.c10.1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20242935002", + "Comment": "firefox-esr-config-privacy is earlier than 0:115.8.0-alt0.c10.1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20242935003", + "Comment": "firefox-esr-wayland is earlier than 0:115.8.0-alt0.c10.1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-2935/objects.json b/oval/c10f2/ALT-PU-2024-2935/objects.json new file mode 100644 index 0000000000..9c701320ea --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-2935/objects.json @@ -0,0 +1,46 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20242935001", + "Version": "1", + "comment": "firefox-esr is installed", + "Name": "firefox-esr" + }, + { + "ID": "oval:org.altlinux.errata:obj:20242935002", + "Version": "1", + "comment": "firefox-esr-config-privacy is installed", + "Name": "firefox-esr-config-privacy" + }, + { + "ID": "oval:org.altlinux.errata:obj:20242935003", + "Version": "1", + "comment": "firefox-esr-wayland is installed", + "Name": "firefox-esr-wayland" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-2935/states.json b/oval/c10f2/ALT-PU-2024-2935/states.json new file mode 100644 index 0000000000..8f2e79c7ef --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-2935/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20242935001", + "Version": "1", + "Comment": "package EVR is earlier than 0:115.8.0-alt0.c10.1", + "Arch": {}, + "Evr": { + "Text": "0:115.8.0-alt0.c10.1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-2935/tests.json b/oval/c10f2/ALT-PU-2024-2935/tests.json new file mode 100644 index 0000000000..9f0e1ad41e --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-2935/tests.json @@ -0,0 +1,54 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20242935001", + "Version": "1", + "Check": "all", + "Comment": "firefox-esr is earlier than 0:115.8.0-alt0.c10.1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20242935001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20242935001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20242935002", + "Version": "1", + "Check": "all", + "Comment": "firefox-esr-config-privacy is earlier than 0:115.8.0-alt0.c10.1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20242935002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20242935001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20242935003", + "Version": "1", + "Check": "all", + "Comment": "firefox-esr-wayland is earlier than 0:115.8.0-alt0.c10.1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20242935003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20242935001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c9f2/ALT-PU-2024-3261/definitions.json b/oval/c9f2/ALT-PU-2024-3261/definitions.json new file mode 100644 index 0000000000..85c1611c1c --- /dev/null +++ b/oval/c9f2/ALT-PU-2024-3261/definitions.json @@ -0,0 +1,736 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20243261", + "Version": "oval:org.altlinux.errata:def:20243261", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-3261: package `xorg-server` update to version 1.20.8-alt12", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c9f2" + ], + "Products": [ + "ALT SPWorkstation", + "ALT SPServer" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-3261", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-3261", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2022-00346", + "RefURL": "https://bdu.fstec.ru/vul/2022-00346", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-00347", + "RefURL": "https://bdu.fstec.ru/vul/2022-00347", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-00348", + "RefURL": "https://bdu.fstec.ru/vul/2022-00348", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-00349", + "RefURL": "https://bdu.fstec.ru/vul/2022-00349", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-04748", + "RefURL": "https://bdu.fstec.ru/vul/2022-04748", + "Source": "BDU" + }, + { + "RefID": "BDU:2022-04749", + "RefURL": "https://bdu.fstec.ru/vul/2022-04749", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-00910", + "RefURL": "https://bdu.fstec.ru/vul/2023-00910", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-02146", + "RefURL": "https://bdu.fstec.ru/vul/2023-02146", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07145", + "RefURL": "https://bdu.fstec.ru/vul/2023-07145", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07412", + "RefURL": "https://bdu.fstec.ru/vul/2023-07412", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07834", + "RefURL": "https://bdu.fstec.ru/vul/2023-07834", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07835", + "RefURL": "https://bdu.fstec.ru/vul/2023-07835", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07836", + "RefURL": "https://bdu.fstec.ru/vul/2023-07836", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07837", + "RefURL": "https://bdu.fstec.ru/vul/2023-07837", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07838", + "RefURL": "https://bdu.fstec.ru/vul/2023-07838", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07839", + "RefURL": "https://bdu.fstec.ru/vul/2023-07839", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00405", + "RefURL": "https://bdu.fstec.ru/vul/2024-00405", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00457", + "RefURL": "https://bdu.fstec.ru/vul/2024-00457", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00638", + "RefURL": "https://bdu.fstec.ru/vul/2024-00638", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00639", + "RefURL": "https://bdu.fstec.ru/vul/2024-00639", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00667", + "RefURL": "https://bdu.fstec.ru/vul/2024-00667", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00675", + "RefURL": "https://bdu.fstec.ru/vul/2024-00675", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00676", + "RefURL": "https://bdu.fstec.ru/vul/2024-00676", + "Source": "BDU" + }, + { + "RefID": "CVE-2021-4008", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4008", + "Source": "CVE" + }, + { + "RefID": "CVE-2021-4009", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4009", + "Source": "CVE" + }, + { + "RefID": "CVE-2021-4010", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4010", + "Source": "CVE" + }, + { + "RefID": "CVE-2021-4011", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4011", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-2319", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2319", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-2320", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2320", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-4283", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46340", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46341", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46342", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46343", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-46344", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-0494", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-1393", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5367", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-5380", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6377", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6478", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-6816", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0229", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0408", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-0409", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-21885", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-21886", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", + "Source": "CVE" + } + ], + "Description": "This update upgrades xorg-server to version 1.20.8-alt12. \nSecurity Fix(es):\n\n * BDU:2022-00346: Уязвимость функции SProcXFixesCreatePointerBarrier реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00347: Уязвимость функции SProcXFixesCreatePointerBarrier реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00348: Уязвимость функции SProcRenderCompositeGlyphs реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00349: Уязвимость функции SwapCreateRegister реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-04748: Уязвимость обработчика вызовов ProcXkbSetGeometry сервера X.Org Server, позволяющая нарушителю выполнить произвольный код или повысить свои привилегии\n\n * BDU:2022-04749: Уязвимость обработчика вызовов ProcXkbSetDeviceInfo сервера X.Org Server, позволяющая нарушителю выполнить произвольный код или повысить свои привилегии\n\n * BDU:2023-00910: Уязвимость функций ProcXkbSetDeviceInfo() и ProcXkbGetDeviceInfo() программного пакета X.Org Server, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02146: Уязвимость программного пакета X.Org Server, связанная с использованием памяти после ее освобождения, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-07145: Уязвимость функций XIChangeDeviceProperty (Xi/xiproperty.c) и RRChangeOutputProperty (randr/rrproperty.c) сервера X Window System Xorg-server, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-07412: Уязвимость функции DestroyWindow пакета xorg-x11-server позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07834: Уязвимость функции XkbCopyNames реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-07835: Уязвимость функции XTestSwapFakeInput реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-07836: Уязвимость функции ProcXIPassiveUngrabDevice реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-07837: Уязвимость функции XvdiSelectVideoNotify реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-07838: Уязвимость функции ScreenSaverSetAttributes реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-07839: Уязвимость функций ProcXIChangeProperty и ProcXChangeDeviceProperty реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2024-00405: Уязвимость функций DeviceFocusEvent и XIQueryPointer реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2024-00457: Уязвимость пакета xorg-x11-server, связанная с использованием памяти после её освобождения при обработке объектов Button Action, позволяющая повысить свои привилегии и выполнить произвольный код в контексте root\n\n * BDU:2024-00638: Уязвимость компонента GLX PBuffer Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00639: Уязвимость компонента Privates Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-00667: Уязвимость функции XISendDeviceHierarchyEvent реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2024-00675: Уязвимость функции DisableDevice реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2024-00676: Уязвимость реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2021-4008: A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2021-4009: A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2021-4010: A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2021-4011: A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2022-2319: A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.\n\n * CVE-2022-2320: A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.\n\n * CVE-2022-4283: A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.\n\n * CVE-2022-46340: A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.\n\n * CVE-2022-46341: A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.\n\n * CVE-2022-46342: A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se\n\n * CVE-2022-46343: A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.\n\n * CVE-2022-46344: A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.\n\n * CVE-2023-0494: A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.\n\n * CVE-2023-1393: A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.\n\n * CVE-2023-5367: A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.\n\n * CVE-2023-5380: A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.\n\n * CVE-2023-6377: A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.\n\n * CVE-2023-6478: A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.\n\n * CVE-2023-6816: A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.\n\n * CVE-2024-0229: An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.\n\n * CVE-2024-0408: A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.\n\n * CVE-2024-0409: A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.\n\n * CVE-2024-21885: A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.\n\n * CVE-2024-21886: A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Critical", + "Rights": "Copyright 2024 BaseALT Ltd.", + "Issued": { + "Date": "2024-03-07" + }, + "Updated": { + "Date": "2024-03-07" + }, + "bdu": [ + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-00346", + "Impact": "High", + "Public": "20211217", + "CveID": "BDU:2022-00346" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-00347", + "Impact": "High", + "Public": "20211217", + "CveID": "BDU:2022-00347" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-00348", + "Impact": "High", + "Public": "20211217", + "CveID": "BDU:2022-00348" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2022-00349", + "Impact": "High", + "Public": "20211217", + "CveID": "BDU:2022-00349" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "Cwe": "CWE-119, CWE-284", + "Href": "https://bdu.fstec.ru/vul/2022-04748", + "Impact": "High", + "Public": "20220705", + "CveID": "BDU:2022-04748" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2022-04749", + "Impact": "High", + "Public": "20211230", + "CveID": "BDU:2022-04749" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-00910", + "Impact": "High", + "Public": "20230207", + "CveID": "BDU:2023-00910" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-02146", + "Impact": "High", + "Public": "20230329", + "CveID": "BDU:2023-02146" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-07145", + "Impact": "High", + "Public": "20231025", + "CveID": "BDU:2023-07145" + }, + { + "Cvss": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "Cvss3": "AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-07412", + "Impact": "Low", + "Public": "20231025", + "CveID": "BDU:2023-07412" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-07834", + "Impact": "High", + "Public": "20221202", + "CveID": "BDU:2023-07834" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-07835", + "Impact": "High", + "Public": "20221121", + "CveID": "BDU:2023-07835" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-07836", + "Impact": "High", + "Public": "20221121", + "CveID": "BDU:2023-07836" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-07837", + "Impact": "High", + "Public": "20221121", + "CveID": "BDU:2023-07837" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://bdu.fstec.ru/vul/2023-07838", + "Impact": "High", + "Public": "20221121", + "CveID": "BDU:2023-07838" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://bdu.fstec.ru/vul/2023-07839", + "Impact": "High", + "Public": "20221121", + "CveID": "BDU:2023-07839" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://bdu.fstec.ru/vul/2024-00405", + "Impact": "High", + "Public": "20240116", + "CveID": "BDU:2024-00405" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125, CWE-787", + "Href": "https://bdu.fstec.ru/vul/2024-00457", + "Impact": "High", + "Public": "20231213", + "CveID": "BDU:2024-00457" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-158", + "Href": "https://bdu.fstec.ru/vul/2024-00638", + "Impact": "Low", + "Public": "20240116", + "CveID": "BDU:2024-00638" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://bdu.fstec.ru/vul/2024-00639", + "Impact": "High", + "Public": "20240116", + "CveID": "BDU:2024-00639" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-122", + "Href": "https://bdu.fstec.ru/vul/2024-00667", + "Impact": "High", + "Public": "20240116", + "CveID": "BDU:2024-00667" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-122", + "Href": "https://bdu.fstec.ru/vul/2024-00675", + "Impact": "High", + "Public": "20240116", + "CveID": "BDU:2024-00675" + }, + { + "Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-788", + "Href": "https://bdu.fstec.ru/vul/2024-00676", + "Impact": "High", + "Public": "20240116", + "CveID": "BDU:2024-00676" + } + ], + "Cves": [ + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4008", + "Impact": "High", + "Public": "20211217", + "CveID": "CVE-2021-4008" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4009", + "Impact": "High", + "Public": "20211217", + "CveID": "CVE-2021-4009" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4010", + "Impact": "High", + "Public": "20211217", + "CveID": "CVE-2021-4010" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-119", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4011", + "Impact": "High", + "Public": "20211217", + "CveID": "CVE-2021-4011" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-1320", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2319", + "Impact": "High", + "Public": "20220901", + "CveID": "CVE-2022-2319" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2320", + "Impact": "High", + "Public": "20220901", + "CveID": "CVE-2022-2320" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283", + "Impact": "High", + "Public": "20221214", + "CveID": "CVE-2022-4283" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340", + "Impact": "High", + "Public": "20221214", + "CveID": "CVE-2022-46340" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341", + "Impact": "High", + "Public": "20221214", + "CveID": "CVE-2022-46341" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342", + "Impact": "High", + "Public": "20221214", + "CveID": "CVE-2022-46342" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343", + "Impact": "High", + "Public": "20221214", + "CveID": "CVE-2022-46343" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344", + "Impact": "High", + "Public": "20221214", + "CveID": "CVE-2022-46344" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494", + "Impact": "High", + "Public": "20230327", + "CveID": "CVE-2023-0494" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393", + "Impact": "High", + "Public": "20230330", + "CveID": "CVE-2023-1393" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", + "Impact": "High", + "Public": "20231025", + "CveID": "CVE-2023-5367" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-416", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380", + "Impact": "Low", + "Public": "20231025", + "CveID": "CVE-2023-5380" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-125", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", + "Impact": "High", + "Public": "20231213", + "CveID": "CVE-2023-6377" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-190", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", + "Impact": "High", + "Public": "20231213", + "CveID": "CVE-2023-6478" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", + "Impact": "Critical", + "Public": "20240118", + "CveID": "CVE-2023-6816" + }, + { + "Cwe": "CWE-788", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", + "Impact": "None", + "Public": "20240209", + "CveID": "CVE-2024-0229" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-Other", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", + "Impact": "Low", + "Public": "20240118", + "CveID": "CVE-2024-0408" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", + "Impact": "High", + "Public": "20240118", + "CveID": "CVE-2024-0409" + }, + { + "Cwe": "CWE-122", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", + "Impact": "None", + "Public": "20240228", + "CveID": "CVE-2024-21885" + }, + { + "Cwe": "CWE-122", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", + "Impact": "None", + "Public": "20240228", + "CveID": "CVE-2024-21886" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:8.4", + "cpe:/o:alt:spserver:8.4" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:3001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20243261001", + "Comment": "xorg-sdk is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261002", + "Comment": "xorg-server is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261003", + "Comment": "xorg-server-common is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261004", + "Comment": "xorg-xdmx is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261005", + "Comment": "xorg-xephyr is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261006", + "Comment": "xorg-xnest is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261007", + "Comment": "xorg-xvfb is earlier than 2:1.20.8-alt12" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243261008", + "Comment": "xorg-xwayland is earlier than 2:1.20.8-alt12" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c9f2/ALT-PU-2024-3261/objects.json b/oval/c9f2/ALT-PU-2024-3261/objects.json new file mode 100644 index 0000000000..2064b5c8ad --- /dev/null +++ b/oval/c9f2/ALT-PU-2024-3261/objects.json @@ -0,0 +1,76 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:3001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d\\.\\d)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20243261001", + "Version": "1", + "comment": "xorg-sdk is installed", + "Name": "xorg-sdk" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261002", + "Version": "1", + "comment": "xorg-server is installed", + "Name": "xorg-server" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261003", + "Version": "1", + "comment": "xorg-server-common is installed", + "Name": "xorg-server-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261004", + "Version": "1", + "comment": "xorg-xdmx is installed", + "Name": "xorg-xdmx" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261005", + "Version": "1", + "comment": "xorg-xephyr is installed", + "Name": "xorg-xephyr" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261006", + "Version": "1", + "comment": "xorg-xnest is installed", + "Name": "xorg-xnest" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261007", + "Version": "1", + "comment": "xorg-xvfb is installed", + "Name": "xorg-xvfb" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243261008", + "Version": "1", + "comment": "xorg-xwayland is installed", + "Name": "xorg-xwayland" + } + ] +} \ No newline at end of file diff --git a/oval/c9f2/ALT-PU-2024-3261/states.json b/oval/c9f2/ALT-PU-2024-3261/states.json new file mode 100644 index 0000000000..fa03852628 --- /dev/null +++ b/oval/c9f2/ALT-PU-2024-3261/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:3001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20243261001", + "Version": "1", + "Comment": "package EVR is earlier than 2:1.20.8-alt12", + "Arch": {}, + "Evr": { + "Text": "2:1.20.8-alt12", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c9f2/ALT-PU-2024-3261/tests.json b/oval/c9f2/ALT-PU-2024-3261/tests.json new file mode 100644 index 0000000000..60de3f9d3b --- /dev/null +++ b/oval/c9f2/ALT-PU-2024-3261/tests.json @@ -0,0 +1,114 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:3001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c9f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:3001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:3001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20243261001", + "Version": "1", + "Check": "all", + "Comment": "xorg-sdk is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261002", + "Version": "1", + "Check": "all", + "Comment": "xorg-server is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261003", + "Version": "1", + "Check": "all", + "Comment": "xorg-server-common is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261004", + "Version": "1", + "Check": "all", + "Comment": "xorg-xdmx is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261005", + "Version": "1", + "Check": "all", + "Comment": "xorg-xephyr is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261006", + "Version": "1", + "Check": "all", + "Comment": "xorg-xnest is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261007", + "Version": "1", + "Check": "all", + "Comment": "xorg-xvfb is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243261008", + "Version": "1", + "Check": "all", + "Comment": "xorg-xwayland is earlier than 2:1.20.8-alt12", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243261008" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243261001" + } + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3190/definitions.json b/oval/p10/ALT-PU-2024-3190/definitions.json new file mode 100644 index 0000000000..da0ce28905 --- /dev/null +++ b/oval/p10/ALT-PU-2024-3190/definitions.json @@ -0,0 +1,101 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20243190", + "Version": "oval:org.altlinux.errata:def:20243190", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-3190: package `neofetch` update to version 7.1.0-alt4", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch p10" + ], + "Products": [ + "ALT Server", + "ALT Virtualization Server", + "ALT Workstation", + "ALT Workstation K", + "ALT Education", + "Simply Linux", + "Starterkit" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-3190", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-3190", + "Source": "ALTPU" + } + ], + "Description": "This update upgrades neofetch to version 7.1.0-alt4. \nSecurity Fix(es):\n\n * #49556: neofetch: huge amount of dependencies", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2024 BaseALT Ltd.", + "Issued": { + "Date": "2024-03-07" + }, + "Updated": { + "Date": "2024-03-07" + }, + "bdu": null, + "Bugzilla": [ + { + "Id": "49556", + "Href": "https://bugzilla.altlinux.org/49556", + "Data": "neofetch: huge amount of dependencies" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:kworkstation:10", + "cpe:/o:alt:workstation:10", + "cpe:/o:alt:server:10", + "cpe:/o:alt:server-v:10", + "cpe:/o:alt:education:10", + "cpe:/o:alt:slinux:10", + "cpe:/o:alt:starterkit:p10", + "cpe:/o:alt:kworkstation:10.1", + "cpe:/o:alt:workstation:10.1", + "cpe:/o:alt:server:10.1", + "cpe:/o:alt:server-v:10.1", + "cpe:/o:alt:education:10.1", + "cpe:/o:alt:slinux:10.1", + "cpe:/o:alt:starterkit:10.1", + "cpe:/o:alt:kworkstation:10.2", + "cpe:/o:alt:workstation:10.2", + "cpe:/o:alt:server:10.2", + "cpe:/o:alt:server-v:10.2", + "cpe:/o:alt:education:10.2", + "cpe:/o:alt:slinux:10.2", + "cpe:/o:alt:starterkit:10.2" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:2001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20243190001", + "Comment": "neofetch is earlier than 0:7.1.0-alt4" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3190/objects.json b/oval/p10/ALT-PU-2024-3190/objects.json new file mode 100644 index 0000000000..de241f4b4a --- /dev/null +++ b/oval/p10/ALT-PU-2024-3190/objects.json @@ -0,0 +1,34 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:2001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20243190001", + "Version": "1", + "comment": "neofetch is installed", + "Name": "neofetch" + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3190/states.json b/oval/p10/ALT-PU-2024-3190/states.json new file mode 100644 index 0000000000..ca987c75c4 --- /dev/null +++ b/oval/p10/ALT-PU-2024-3190/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:2001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20243190001", + "Version": "1", + "Comment": "package EVR is earlier than 0:7.1.0-alt4", + "Arch": {}, + "Evr": { + "Text": "0:7.1.0-alt4", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3190/tests.json b/oval/p10/ALT-PU-2024-3190/tests.json new file mode 100644 index 0000000000..5d7f27b506 --- /dev/null +++ b/oval/p10/ALT-PU-2024-3190/tests.json @@ -0,0 +1,30 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:2001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'p10' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:2001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:2001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20243190001", + "Version": "1", + "Check": "all", + "Comment": "neofetch is earlier than 0:7.1.0-alt4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243190001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243190001" + } + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3259/definitions.json b/oval/p10/ALT-PU-2024-3259/definitions.json new file mode 100644 index 0000000000..2bb8a885ad --- /dev/null +++ b/oval/p10/ALT-PU-2024-3259/definitions.json @@ -0,0 +1,125 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20243259", + "Version": "oval:org.altlinux.errata:def:20243259", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-3259: package `wine` update to version 9.0.9-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch p10" + ], + "Products": [ + "ALT Server", + "ALT Virtualization Server", + "ALT Workstation", + "ALT Workstation K", + "ALT Education", + "Simply Linux", + "Starterkit" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-3259", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-3259", + "Source": "ALTPU" + } + ], + "Description": "This update upgrades wine to version 9.0.9-alt1. \nSecurity Fix(es):\n\n * #47472: Не работает wineg++", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2024 BaseALT Ltd.", + "Issued": { + "Date": "2024-03-07" + }, + "Updated": { + "Date": "2024-03-07" + }, + "bdu": null, + "Bugzilla": [ + { + "Id": "47472", + "Href": "https://bugzilla.altlinux.org/47472", + "Data": "Не работает wineg++" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:kworkstation:10", + "cpe:/o:alt:workstation:10", + "cpe:/o:alt:server:10", + "cpe:/o:alt:server-v:10", + "cpe:/o:alt:education:10", + "cpe:/o:alt:slinux:10", + "cpe:/o:alt:starterkit:p10", + "cpe:/o:alt:kworkstation:10.1", + "cpe:/o:alt:workstation:10.1", + "cpe:/o:alt:server:10.1", + "cpe:/o:alt:server-v:10.1", + "cpe:/o:alt:education:10.1", + "cpe:/o:alt:slinux:10.1", + "cpe:/o:alt:starterkit:10.1", + "cpe:/o:alt:kworkstation:10.2", + "cpe:/o:alt:workstation:10.2", + "cpe:/o:alt:server:10.2", + "cpe:/o:alt:server-v:10.2", + "cpe:/o:alt:education:10.2", + "cpe:/o:alt:slinux:10.2", + "cpe:/o:alt:starterkit:10.2" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:2001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20243259001", + "Comment": "wine is earlier than 1:9.0.9-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243259002", + "Comment": "wine-common is earlier than 1:9.0.9-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243259003", + "Comment": "wine-devel is earlier than 1:9.0.9-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243259004", + "Comment": "wine-devel-tools is earlier than 1:9.0.9-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243259005", + "Comment": "wine-full is earlier than 1:9.0.9-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243259006", + "Comment": "wine-ping is earlier than 1:9.0.9-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20243259007", + "Comment": "wine-programs is earlier than 1:9.0.9-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3259/objects.json b/oval/p10/ALT-PU-2024-3259/objects.json new file mode 100644 index 0000000000..28cd6f4e86 --- /dev/null +++ b/oval/p10/ALT-PU-2024-3259/objects.json @@ -0,0 +1,70 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:2001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20243259001", + "Version": "1", + "comment": "wine is installed", + "Name": "wine" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243259002", + "Version": "1", + "comment": "wine-common is installed", + "Name": "wine-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243259003", + "Version": "1", + "comment": "wine-devel is installed", + "Name": "wine-devel" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243259004", + "Version": "1", + "comment": "wine-devel-tools is installed", + "Name": "wine-devel-tools" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243259005", + "Version": "1", + "comment": "wine-full is installed", + "Name": "wine-full" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243259006", + "Version": "1", + "comment": "wine-ping is installed", + "Name": "wine-ping" + }, + { + "ID": "oval:org.altlinux.errata:obj:20243259007", + "Version": "1", + "comment": "wine-programs is installed", + "Name": "wine-programs" + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3259/states.json b/oval/p10/ALT-PU-2024-3259/states.json new file mode 100644 index 0000000000..977954404c --- /dev/null +++ b/oval/p10/ALT-PU-2024-3259/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:2001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20243259001", + "Version": "1", + "Comment": "package EVR is earlier than 1:9.0.9-alt1", + "Arch": {}, + "Evr": { + "Text": "1:9.0.9-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-3259/tests.json b/oval/p10/ALT-PU-2024-3259/tests.json new file mode 100644 index 0000000000..9024d007ca --- /dev/null +++ b/oval/p10/ALT-PU-2024-3259/tests.json @@ -0,0 +1,102 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:2001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'p10' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:2001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:2001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20243259001", + "Version": "1", + "Check": "all", + "Comment": "wine is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243259002", + "Version": "1", + "Check": "all", + "Comment": "wine-common is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243259003", + "Version": "1", + "Check": "all", + "Comment": "wine-devel is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243259004", + "Version": "1", + "Check": "all", + "Comment": "wine-devel-tools is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243259005", + "Version": "1", + "Check": "all", + "Comment": "wine-full is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243259006", + "Version": "1", + "Check": "all", + "Comment": "wine-ping is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20243259007", + "Version": "1", + "Check": "all", + "Comment": "wine-programs is earlier than 1:9.0.9-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20243259007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20243259001" + } + } + ] +} \ No newline at end of file