4516 lines
236 KiB
JSON
4516 lines
236 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20231462",
|
||
"Version": "oval:org.altlinux.errata:def:20231462",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2023-1462: package `chromium-gost` update to version 110.0.5481.177-alt1.p10.1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2023-1462",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1462",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03500",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03500",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03501",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03501",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03502",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03502",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03503",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03503",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03731",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03731",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03732",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03732",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03733",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03733",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03734",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03734",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03735",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03735",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03736",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03736",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03737",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03737",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03747",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03747",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04198",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04198",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04600",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04600",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04787",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04787",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04877",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04877",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04883",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04883",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04884",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04884",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04886",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04886",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05020",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05020",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05021",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05021",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05022",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05022",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05023",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05023",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05150",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05150",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05151",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05151",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05152",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05152",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05153",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05153",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05323",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05323",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05354",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05354",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05355",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05355",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05357",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05357",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05359",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05359",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05360",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05360",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05361",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05361",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05428",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05428",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05429",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05429",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05430",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05430",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05432",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05432",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05439",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05439",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05448",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05448",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05449",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05449",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05450",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05450",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05451",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05451",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05452",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05452",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05453",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05453",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05454",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05454",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05455",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05455",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05456",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05456",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05457",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05457",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05458",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05458",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05459",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05459",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05460",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05460",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05461",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05461",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05462",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05462",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05463",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05463",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05464",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05464",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05465",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05465",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05466",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05466",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05467",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05467",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05468",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05468",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05469",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05469",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05490",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05490",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05499",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05499",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05628",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05628",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06270",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06270",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06271",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06271",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06320",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06320",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06321",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06321",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06322",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06322",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06323",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06323",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06324",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06324",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06371",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06371",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06372",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06372",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06521",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06521",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06527",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06527",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06528",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06528",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06529",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06529",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06530",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06530",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06531",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06531",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06532",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06532",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06533",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06533",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06534",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06534",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06535",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06535",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06536",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06536",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06537",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06537",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06538",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06538",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06539",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06539",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06546",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06546",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06610",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06610",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06611",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06611",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06612",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06612",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06613",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06613",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06630",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06630",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06634",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06634",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06646",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06646",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06647",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06647",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06648",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06648",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06649",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06649",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06650",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06650",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06706",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06706",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06759",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06759",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06760",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06760",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06761",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06761",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06762",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06762",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06763",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06763",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06875",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06875",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06993",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06993",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07073",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07073",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07153",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07153",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07230",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07230",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07256",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07256",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07258",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07258",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07315",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07315",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07321",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07321",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07460",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07460",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07498",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07498",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00071",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00071",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00166",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00166",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00357",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00357",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00392",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00392",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00394",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00394",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00533",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00533",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00534",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00534",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00537",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00537",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00648",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00648",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00649",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00649",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00650",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00650",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00651",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00651",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00652",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00652",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00653",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00653",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00654",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00654",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00754",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00754",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00929",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00929",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00930",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00930",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00957",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00957",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00958",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00958",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00959",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00959",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00960",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00960",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00961",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00961",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00972",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00972",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00973",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00973",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00974",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00974",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01060",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01060",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2007",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2007",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2008",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2008",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2010",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2010",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2157",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2157",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2158",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2158",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2160",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2160",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2161",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2161",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2162",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2162",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2163",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2163",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2164",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2164",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2165",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2165",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2294",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2294",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2295",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2295",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2415",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2415",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2478",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2478",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2481",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2481",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2603",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2603",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2604",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2604",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2605",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2605",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2606",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2606",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2610",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2610",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2612",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2612",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2614",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2614",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2615",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2615",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2616",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2616",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2617",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2617",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2618",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2618",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2619",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2619",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2621",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2621",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2624",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2624",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2852",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2852",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2854",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2854",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2855",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2855",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2857",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2857",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2858",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2858",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2859",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2859",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2860",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2860",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2861",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2861",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2998",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2998",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3038",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3038",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3039",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3039",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3040",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3040",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3041",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3041",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3042",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3042",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3043",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3043",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3044",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3044",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3045",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3045",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3046",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3046",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3047",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3047",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3048",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3048",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3049",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3049",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3050",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3050",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3051",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3051",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3052",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3052",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3053",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3053",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3054",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3054",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3055",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3055",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3056",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3056",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3057",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3057",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3058",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3058",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3071",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3071",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3075",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3075",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3196",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3196",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3197",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3197",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3200",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3200",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3201",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3201",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3304",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3304",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3305",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3305",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3306",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3306",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3307",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3307",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3308",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3308",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3309",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3309",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3310",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3310",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3311",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3311",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3312",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3312",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3313",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3313",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3314",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3314",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3315",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3315",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3316",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3316",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3317",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3317",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3370",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3370",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3373",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3373",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3444",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3444",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3445",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3445",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3446",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3446",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3447",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3447",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3449",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3449",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3450",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3450",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3652",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3652",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3653",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3653",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3654",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3654",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3655",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3655",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3656",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3656",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3657",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3657",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3658",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3658",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3659",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3659",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3660",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3660",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3661",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3661",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3723",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3723",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3842",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3842",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3885",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3885",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3886",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3886",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3887",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3887",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3888",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3888",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3889",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3889",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3890",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3890",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4135",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4135",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4174",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4174",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4175",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4175",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4176",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4176",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4177",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4177",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4178",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4178",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4179",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4179",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4180",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4180",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4181",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4181",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4182",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4182",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4183",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4183",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4184",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4184",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4185",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4185",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4186",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4186",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4187",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4187",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4188",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4188",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4189",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4189",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4190",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4190",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4191",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4191",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4192",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4192",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4193",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4193",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4194",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4194",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4262",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4262",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4436",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4436",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4437",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4437",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4438",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4438",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4440",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4440",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0128",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0128",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0129",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0129",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0130",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0130",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0131",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0131",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0132",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0132",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0133",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0133",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0134",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0134",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0135",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0135",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0136",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0136",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0137",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0137",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0138",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0138",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0139",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0139",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0140",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0140",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0141",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0141",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0471",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0471",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0472",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0472",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0473",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0473",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0474",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0474",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0697",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0697",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0698",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0698",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0699",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0699",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0700",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0700",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0701",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0701",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0702",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0702",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0703",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0703",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0704",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0704",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0705",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0705",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0927",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0927",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0928",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0928",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0929",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0929",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0930",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0930",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0931",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0931",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0932",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0932",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0933",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0933",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0941",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0941",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium-gost to version 110.0.5481.177-alt1.p10.1. \nSecurity Fix(es):\n\n * BDU:2022-03500: Уязвимость компонента Compositing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-03501: Уязвимость API для работы с компьютерной графикой WebGPU браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-03502: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-03503: Уязвимость компонента WebGL браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-03731: Уязвимость интерфейса File System API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти введенные ограничения безопасности с помощью специально созданного веб-сайта\n\n * BDU:2022-03732: Уязвимость браузеров Google Chrome и Microsoft Edge, существующая из-за недостаточной проверки входных данных при форматировании URL-адресов, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-03733: Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-03734: Уязвимость компонента WebApp Provider браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-03735: Уязвимость набора инструментов для веб-разработки DevTools браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2022-03736: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03737: Уязвимость реализации расширения «Группы вкладок» браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03747: Уязвимость компонента Base браузеров Google Chrome и Microsoft, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04198: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04600: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-04787: Уязвимость компонента WebGL веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-04877: Уязвимость настроек Settings браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-04883: Уязвимость браузеров Google Chrome и Microsoft Edge, связанная с недостаточной проверкой входных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-04884: Уязвимость обработчика PDF-содержимого PDFium браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04886: Уязвимость расширений браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05020: Уязвимость компонента Federated Credential Management браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05021: Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05022: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05023: Уязвимость механизма отображения веб-страниц Blink браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05150: Уязвимость командной строки Chrome OS Shell (CROSH), позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05151: Уязвимость компонента входа в систему Sign-In браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05152: Уязвимость компонента Extensions API браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05153: Уязвимость механизма обработки файлов cookie браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть защищаемую информацию\n\n * BDU:2022-05323: Уязвимость компонента Views браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05354: Уязвимость механизма обработки файлов cookie браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть защищаемую информацию\n\n * BDU:2022-05355: Уязвимость компонента Background Fetch браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05357: Уязвимость обработчика PDF-содержимого браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05359: Уязвимость гостевого режима браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05360: Уязвимость службы Worker API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05361: Уязвимость компонента входа в систему Sign-In браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05428: Уязвимость браузеров Google Chrome и Microsoft Edge, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05429: Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05430: Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-05432: Уязвимость адресной строки Omnibox браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05439: Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05448: Уязвимость службы Network браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05449: Уязвимость модуля WebSQL браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05450: Уязвимость компонента Layout браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05451: Уязвимость модуля WebSQL браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05452: Уязвимость функция PhoneHub браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05453: Уязвимость функции захват экрана (Screen Capture) браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05454: Уязвимость функции изоляции сайтов (Site Isolation) браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05455: Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05456: Уязвимость компонента Browser Tag браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05457: Уязвимость элемента управления вкладками Tab Strip браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05458: Уязвимость компонента Extensions API браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-05459: Уязвимость экрана блокировки операционной системы Chrome OS, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-05460: Уязвимость режима разделения экрана SplitScreen браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05461: Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05462: Уязвимость компонента Exosphere браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05463: Уязвимость расширения Window Manager браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05464: Уязвимость компонента Pointer Lock браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05465: Уязвимость набора инструментов для веб-разработки DevTools браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-05466: Уязвимость диспетчера паролей браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05467: Уязвимость реализации механизма CSP (Content Security Policy) браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05468: Уязвимость изолированной среды iframe браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05469: Уязвимость компонента входа в систему Sign-In браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05490: Уязвимость функции Browser Creation операционной системы Chrome OS, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05499: Уязвимость IPC-библиотеки Mojo браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05628: Уязвимость компонента Dawn браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05629: Уязвимость интерфейса API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06270: Уязвимость компонента Notifications (Уведомления) браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2022-06271: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06320: Уязвимость расширения VPN браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06321: Уязвимость пользовательского интерфейса браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-06322: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06323: Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06324: Уязвимость механизма отображения веб-страниц Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06371: Уязвимость пользовательских элементов браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06372: Уязвимость функции Intents браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06521: Уязвимость компонента Media браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06527: Уязвимость набора инструментов для веб-разработчиков Developer Tools браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть защищаемую информацию\n\n * BDU:2022-06528: Уязвимость реализации функции импорта браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06529: Уязвимость компонента PDFium браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06530: Уязвимость компонента PDFium браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06531: Уязвимость браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06532: Уязвимость компонента Internals браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06533: Уязвимость набора инструментов для веб-разработчиков Developer Tools веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06534: Уязвимость компонента Assistant веб-браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06535: Уязвимость компонента Frames браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06536: Уязвимость хранилища Storage браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06537: Уязвимость компонента Survey операционной системы Chrome OS, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06538: Уязвимость пользовательских вкладок браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть защищаемую информацию\n\n * BDU:2022-06539: Уязвимость компонента Survey веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06546: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю\n\n * BDU:2022-06610: Уязвимость расширений браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06611: Уязвимость интерфейса для доступа к медиафайлам chrome.mediaGalleries браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06612: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06613: Уязвимость реализации полноэкранного режима браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации\n\n * BDU:2022-06629: Уязвимость пиринговых соединений (Peer Connection) браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06630: Уязвимость пользовательских вкладок браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06634: Уязвимость режима рендеринга Vulkan браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06646: Уязвимость расширения Feedback браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06647: Уязвимость модуля Accessibility (Специальные возможности) браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06648: Уязвимость расширений браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06649: Уязвимость компонента Layout браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06650: Уязвимость файловой системы браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-06706: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06759: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06760: Уязвимость механизма Web Workers браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06761: Уязвимость компонента WebCodecs браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06762: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06763: Уязвимость компонента Crashpad браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06875: Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06993: Уязвимость графического процессора браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды\n\n * BDU:2022-07073: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07153: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07230: Уязвимость набора инструментов для веб-разработки DevTools браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-07256: Уязвимость компонента Blink Media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07258: Уязвимость IPC-библиотеки Mojo браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07315: Уязвимость компонента Blink Frames браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07321: Уязвимость компонента Profiles браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07460: Уязвимость функции Navigation браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-07498: Уязвимость реализации механизма CORS браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2023-00071: Уязвимость функции Overview Mode браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00166: Уязвимость сетевой службы браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00357: Уязвимость компонента Accessibility браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать повреждение стека\n\n * BDU:2023-00392: Уязвимость компонента WebTransport браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00394: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00400: Уязвимость IPC-библиотеки Mojo браузера Google Chrome, позволяющая нарушителю выполнить произвольный код с помощью специально созданного расширения в Chrome\n\n * BDU:2023-00533: Уязвимость реализации всплывающих окон с запросом на разрешение браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00534: Уязвимость интерфейса File System API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2023-00537: Уязвимость механизма «Downloads» («Загрузки») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2023-00648: Уязвимость компонента Core веб-браузера Google Chrome, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-00649: Уязвимость набора инструментов для веб-разработки DevTools веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00650: Уязвимость компонента Data Transfer веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00651: Уязвимость набора инструментов для веб-разработки DevTools веб-браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2023-00652: Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00653: Уязвимость загрузчика веб-браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-00654: Уязвимость графического процессора GPU браузеров Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00754: Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00929: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00930: Уязвимость реализации полноэкранного режима (Full Screen Mode) браузера Google Chrome, позволяющая нарушителю изменить содержимое пользовательского интерфейса\n\n * BDU:2023-00957: Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-00958: Уязвимость компонента Video браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00959: Уязвимость режима рендеринга Vulkan браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00960: Уязвимость реализации технологии WebRTC браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00961: Уязвимость функции PDF Viewer браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00972: Уязвимость интерфейса Web Payments API браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00973: Уязвимость компонента Prompts браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00974: Уязвимость компонента Video браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01060: Уязвимость оконного менеджера браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2022-2007: Use after free in WebGPU in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2008: Double free in WebGL in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2010: Out of bounds read in compositing in Google Chrome prior to 102.0.5005.115 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-2011: Use after free in ANGLE in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2156: Use after free in Core in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2157: Use after free in Interest groups in Google Chrome prior to 103.0.5060.53 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2158: Type confusion in V8 in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2160: Insufficient policy enforcement in DevTools in Google Chrome on Windows prior to 103.0.5060.53 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from a user's local files via a crafted HTML page.\n\n * CVE-2022-2161: Use after free in WebApp Provider in Google Chrome prior to 103.0.5060.53 allowed a remote attacker who convinced the user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.\n\n * CVE-2022-2162: Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 103.0.5060.53 allowed a remote attacker to bypass file system access via a crafted HTML page.\n\n * CVE-2022-2163: Use after free in Cast UI and Toolbar in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via UI interaction.\n\n * CVE-2022-2164: Inappropriate implementation in Extensions API in Google Chrome prior to 103.0.5060.53 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted HTML page.\n\n * CVE-2022-2165: Insufficient data validation in URL formatting in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2022-2294: Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2295: Type confusion in V8 in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2415: Heap buffer overflow in WebGL in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2477: Use after free in Guest View in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2478: Use after free in PDF in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2480: Use after free in Service Worker API in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2481: Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.\n\n * CVE-2022-2603: Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2604: Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2605: Out of bounds read in Dawn in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2606: Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2610: Insufficient policy enforcement in Background Fetch in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-2612: Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2022-2614: Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2615: Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-2616: Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.\n\n * CVE-2022-2617: Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.\n\n * CVE-2022-2618: Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file .\n\n * CVE-2022-2619: Insufficient validation of untrusted input in Settings in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted HTML page.\n\n * CVE-2022-2621: Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.\n\n * CVE-2022-2624: Heap buffer overflow in PDF in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2022-2743: Integer overflow in Window Manager in Google Chrome on Chrome OS and Lacros prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific UI interactions to perform an out of bounds memory write via crafted UI interactions. (Chrome security severity: High)\n\n * CVE-2022-2852: Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2854: Use after free in SwiftShader in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2855: Use after free in ANGLE in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2857: Use after free in Blink in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2858: Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction.\n\n * CVE-2022-2859: Use after free in Chrome OS Shell in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions.\n\n * CVE-2022-2860: Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to bypass cookie prefix restrictions via a crafted HTML page.\n\n * CVE-2022-2861: Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.101 allowed an attacker who convinced a user to install a malicious extension to inject arbitrary scripts into WebUI via a crafted HTML page.\n\n * CVE-2022-2998: Use after free in Browser Creation in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who had convinced a user to engage in a specific UI interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3038: Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3039: Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3040: Use after free in Layout in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3041: Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3042: Use after free in PhoneHub in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3043: Heap buffer overflow in Screen Capture in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3044: Inappropriate implementation in Site Isolation in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.\n\n * CVE-2022-3045: Insufficient validation of untrusted input in V8 in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3046: Use after free in Browser Tag in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3047: Insufficient policy enforcement in Extensions API in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.\n\n * CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a local attacker to bypass lockscreen navigation restrictions via physical access to the device.\n\n * CVE-2022-3049: Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3050: Heap buffer overflow in WebUI in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.\n\n * CVE-2022-3051: Heap buffer overflow in Exosphere in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.\n\n * CVE-2022-3052: Heap buffer overflow in Window Manager in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.\n\n * CVE-2022-3053: Inappropriate implementation in Pointer Lock in Google Chrome on Mac prior to 105.0.5195.52 allowed a remote attacker to restrict user navigation via a crafted HTML page.\n\n * CVE-2022-3054: Insufficient policy enforcement in DevTools in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3055: Use after free in Passwords in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3056: Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2022-3057: Inappropriate implementation in iframe Sandbox in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-3058: Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.\n\n * CVE-2022-3071: Use after free in Tab Strip in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.\n\n * CVE-2022-3075: Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-3195: Out of bounds write in Storage in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3196: Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)\n\n * CVE-2022-3197: Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)\n\n * CVE-2022-3198: Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)\n\n * CVE-2022-3199: Use after free in Frames in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3200: Heap buffer overflow in Internals in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3201: Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3304: Use after free in CSS in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3305: Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3306: Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3307: Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3308: Insufficient policy enforcement in developer tools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3309: Use after free in assistant in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: Medium)\n\n * CVE-2022-3310: Insufficient policy enforcement in custom tabs in Google Chrome on Android prior to 106.0.5249.62 allowed an attacker who convinced the user to install an application to bypass same origin policy via a crafted application. (Chromium security severity: Medium)\n\n * CVE-2022-3311: Use after free in import in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3312: Insufficient validation of untrusted input in VPN in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a local attacker to bypass managed device restrictions via physical access to the device. (Chromium security severity: Medium)\n\n * CVE-2022-3313: Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3314: Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3315: Type confusion in Blink in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3316: Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass security feature via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3317: Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3318: Use after free in ChromeOS Notifications in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to reboot Chrome OS to potentially exploit heap corruption via UI interaction. (Chromium security severity: Low)\n\n * CVE-2022-3370: Use after free in Custom Elements in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3373: Out of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3443: Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3444: Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page and malicious file. (Chromium security severity: Low)\n\n * CVE-2022-3445: Use after free in Skia in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3446: Heap buffer overflow in WebSQL in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3447: Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 106.0.5249.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3448: Use after free in Permissions API in Google Chrome prior to 106.0.5249.119 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3449: Use after free in Safe Browsing in Google Chrome prior to 106.0.5249.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)\n\n * CVE-2022-3450: Use after free in Peer Connection in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3652: Type confusion in V8 in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3653: Heap buffer overflow in Vulkan in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3654: Use after free in Layout in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3655: Heap buffer overflow in Media Galleries in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3656: Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3657: Use after free in Extensions in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)\n\n * CVE-2022-3658: Use after free in Feedback service on Chrome OS in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)\n\n * CVE-2022-3659: Use after free in Accessibility in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: Medium)\n\n * CVE-2022-3660: Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 107.0.5304.62 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3661: Insufficient data validation in Extensions in Google Chrome prior to 107.0.5304.62 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted Chrome extension. (Chromium security severity: Low)\n\n * CVE-2022-3723: Type confusion in V8 in Google Chrome prior to 107.0.5304.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3842: Use after free in Passwords in Google Chrome prior to 105.0.5195.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3885: Use after free in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3886: Use after free in Speech Recognition in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3887: Use after free in Web Workers in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3888: Use after free in WebCodecs in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3889: Type confusion in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3890: Heap buffer overflow in Crashpad in Google Chrome on Android prior to 107.0.5304.106 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4135: Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4174: Type confusion in V8 in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4175: Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4176: Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)\n\n * CVE-2022-4177: Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)\n\n * CVE-2022-4178: Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4179: Use after free in Audio in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)\n\n * CVE-2022-4180: Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)\n\n * CVE-2022-4181: Use after free in Forms in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4182: Inappropriate implementation in Fenced Frames in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass fenced frame restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4183: Insufficient policy enforcement in Popup Blocker in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4184: Insufficient policy enforcement in Autofill in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4185: Inappropriate implementation in Navigation in Google Chrome on iOS prior to 108.0.5359.71 allowed a remote attacker to spoof the contents of the modal dialogue via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4186: Insufficient validation of untrusted input in Downloads in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass Downloads restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4187: Insufficient policy enforcement in DevTools in Google Chrome on Windows prior to 108.0.5359.71 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4188: Insufficient validation of untrusted input in CORS in Google Chrome on Android prior to 108.0.5359.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4189: Insufficient policy enforcement in DevTools in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)\n\n * CVE-2022-4190: Insufficient data validation in Directory in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4191: Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. (Chromium security severity: Medium)\n\n * CVE-2022-4192: Use after free in Live Caption in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: Medium)\n\n * CVE-2022-4193: Insufficient policy enforcement in File System API in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4194: Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-4195: Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass Safe Browsing warnings via a malicious file. (Chromium security severity: Medium)\n\n * CVE-2022-4262: Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4436: Use after free in Blink Media in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4437: Use after free in Mojo IPC in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4438: Use after free in Blink Frames in Google Chrome prior to 108.0.5359.124 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-4440: Use after free in Profiles in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0128: Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0129: Heap buffer overflow in Network Service in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. (Chromium security severity: High)\n\n * CVE-2023-0130: Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0131: Inappropriate implementation in in iframe Sandbox in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to bypass file download restrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0132: Inappropriate implementation in in Permission prompts in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to force acceptance of a permission prompt via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0133: Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0134: Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0135: Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0136: Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0137: Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0138: Heap buffer overflow in libphonenumber in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2023-0139: Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2023-0140: Inappropriate implementation in in File System API in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2023-0141: Insufficient policy enforcement in CORS in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2023-0471: Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0472: Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0473: Type Confusion in ServiceWorker API in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0474: Use after free in GuestView in Google Chrome prior to 109.0.5414.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a Chrome web app. (Chromium security severity: Medium)\n\n * CVE-2023-0696: Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0697: Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0698: Out of bounds read in WebRTC in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0699: Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)\n\n * CVE-2023-0700: Inappropriate implementation in Download in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0701: Heap buffer overflow in WebUI in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interaction . (Chromium security severity: Medium)\n\n * CVE-2023-0702: Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2023-0703: Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium)\n\n * CVE-2023-0704: Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2023-0705: Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2023-0927: Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0928: Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0929: Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0930: Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0931: Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0932: Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2023-0933: Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)\n\n * CVE-2023-0941: Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n\n * #44986: Не использует прокси-сервер, указанный в переменных окружения\n\n * #45192: Поиск через yandex по умолчанию\n\n * #45269: chromium падает после вызова справки или недолгой работы\n\n * #45454: chromium: Браузер очень медленно работает",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2023-03-18"
|
||
},
|
||
"Updated": {
|
||
"Date": "2023-03-18"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-03500",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03500",
|
||
"Impact": "High",
|
||
"Public": "20220513"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03501",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03501",
|
||
"Impact": "High",
|
||
"Public": "20220517"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03502",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03502",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03503",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03503",
|
||
"Impact": "High",
|
||
"Public": "20220419"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03731",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03731",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03732",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03732",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03733",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03733",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03734",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03734",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03735",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03735",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03736",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03736",
|
||
"Impact": "High",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03737",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03737",
|
||
"Impact": "High",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03747",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03747",
|
||
"Impact": "Critical",
|
||
"Public": "20220611"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04198",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04198",
|
||
"Impact": "Critical",
|
||
"Public": "20220704"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04600",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04600",
|
||
"Impact": "Low",
|
||
"Public": "20220704"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04787",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04787",
|
||
"Impact": "High",
|
||
"Public": "20220414"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04877",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04877",
|
||
"Impact": "Low",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04883",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04883",
|
||
"Impact": "Low",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04884",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04884",
|
||
"Impact": "High",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04886",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04886",
|
||
"Impact": "Low",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05020",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05020",
|
||
"Impact": "Critical",
|
||
"Public": "20220816"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05021",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05021",
|
||
"Impact": "Critical",
|
||
"Public": "20220816"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05022",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05022",
|
||
"Impact": "Critical",
|
||
"Public": "20220816"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05023",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05023",
|
||
"Impact": "Critical",
|
||
"Public": "20220817"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05150",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05150",
|
||
"Impact": "Low",
|
||
"Public": "20220622"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05151",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05151",
|
||
"Impact": "High",
|
||
"Public": "20220816"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05152",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05152",
|
||
"Impact": "High",
|
||
"Public": "20220821"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05153",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264, CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05153",
|
||
"Impact": "Low",
|
||
"Public": "20220818"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05323",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05323",
|
||
"Impact": "High",
|
||
"Public": "20220727"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05354",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-264, CWE-565",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05354",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05355",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-264, CWE-284, CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05355",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05357",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05357",
|
||
"Impact": "High",
|
||
"Public": "20220727"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05359",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05359",
|
||
"Impact": "High",
|
||
"Public": "20220727"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05360",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05360",
|
||
"Impact": "High",
|
||
"Public": "20220727"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05361",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05361",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05428",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203, CWE-310",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05428",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05429",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05429",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05430",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05430",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05432",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05432",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05439",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05439",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05448",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05448",
|
||
"Impact": "Critical",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05449",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05449",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05450",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05450",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05451",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05451",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05452",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05452",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05453",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05453",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05454",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05454",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05455",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05455",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05456",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05456",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05457",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05457",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05458",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264, CWE-863",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05458",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05459",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05459",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05460",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05460",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05461",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05461",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05462",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05462",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05463",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05463",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05464",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05464",
|
||
"Impact": "High",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05465",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05465",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05466",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05466",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05467",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05467",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05468",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05468",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05469",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05469",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05490",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05490",
|
||
"Impact": "High",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05499",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05499",
|
||
"Impact": "Critical",
|
||
"Public": "20220902"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05628",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05628",
|
||
"Impact": "Low",
|
||
"Public": "20220622"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05629",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05629",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06270",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06270",
|
||
"Impact": "Low",
|
||
"Public": "20220422"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06271",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06271",
|
||
"Impact": "Critical",
|
||
"Public": "20220921"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06320",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06320",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06321",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06321",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06322",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06322",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06323",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06323",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06324",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06324",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06371",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06371",
|
||
"Impact": "Critical",
|
||
"Public": "20220922"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06372",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06372",
|
||
"Impact": "Low",
|
||
"Public": "20220224"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06521",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06521",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06527",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06527",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06528",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06528",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06529",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06529",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06530",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06530",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06531",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06531",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06532",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06532",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06533",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06533",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06534",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06534",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06535",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06535",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06536",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06536",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06537",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06537",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06538",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06538",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06539",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06539",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06546",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06546",
|
||
"Impact": "Critical",
|
||
"Public": "20221027"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06610",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06610",
|
||
"Impact": "High",
|
||
"Public": "20220809"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06611",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-119, CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06611",
|
||
"Impact": "High",
|
||
"Public": "20220711"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06612",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06612",
|
||
"Impact": "Critical",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06613",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06613",
|
||
"Impact": "High",
|
||
"Public": "20220520"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06629",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06629",
|
||
"Impact": "Critical",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06630",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06630",
|
||
"Impact": "Critical",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06634",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06634",
|
||
"Impact": "Critical",
|
||
"Public": "20221025"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06646",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06646",
|
||
"Impact": "High",
|
||
"Public": "20221025"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06647",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06647",
|
||
"Impact": "High",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06648",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06648",
|
||
"Impact": "High",
|
||
"Public": "20221025"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06649",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06649",
|
||
"Impact": "Critical",
|
||
"Public": "20221025"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06650",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06650",
|
||
"Impact": "High",
|
||
"Public": "20221025"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06706",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06706",
|
||
"Impact": "High",
|
||
"Public": "20221108"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06759",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06759",
|
||
"Impact": "High",
|
||
"Public": "20221108"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06760",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06760",
|
||
"Impact": "High",
|
||
"Public": "20221108"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06761",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06761",
|
||
"Impact": "High",
|
||
"Public": "20221108"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06762",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06762",
|
||
"Impact": "High",
|
||
"Public": "20221108"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06763",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06763",
|
||
"Impact": "High",
|
||
"Public": "20221108"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06875",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06875",
|
||
"Impact": "High",
|
||
"Public": "20221114"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06993",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06993",
|
||
"Impact": "Critical",
|
||
"Public": "20221124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07073",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07073",
|
||
"Impact": "Critical",
|
||
"Public": "20221129"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07153",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07153",
|
||
"Impact": "High",
|
||
"Public": "20221202"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07230",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07230",
|
||
"Impact": "Low",
|
||
"Public": "20221104"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07256",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07256",
|
||
"Impact": "Critical",
|
||
"Public": "20221213"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07258",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07258",
|
||
"Impact": "Critical",
|
||
"Public": "20221213"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07315",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07315",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07321",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07321",
|
||
"Impact": "High",
|
||
"Public": "20221213"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07460",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07460",
|
||
"Impact": "Low",
|
||
"Public": "20221010"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07498",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07498",
|
||
"Impact": "Low",
|
||
"Public": "20220630"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00071",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00071",
|
||
"Impact": "Critical",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00166",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00166",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00357",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00357",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00392",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00392",
|
||
"Impact": "Critical",
|
||
"Public": "20230124"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00394",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00394",
|
||
"Impact": "High",
|
||
"Public": "20230124"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00400",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00400",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00533",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00533",
|
||
"Impact": "Low",
|
||
"Public": "20221005"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00534",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00534",
|
||
"Impact": "Low",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00537",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00537",
|
||
"Impact": "Low",
|
||
"Public": "20220924"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00648",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00648",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00649",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00649",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00650",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00650",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00651",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00651",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00652",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00652",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00653",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00653",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00654",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00654",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00754",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00754",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00929",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00929",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00930",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00930",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00957",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00957",
|
||
"Impact": "High",
|
||
"Public": "20220322"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00958",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00958",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00959",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00959",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00960",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00960",
|
||
"Impact": "High",
|
||
"Public": "20230205"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00961",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00961",
|
||
"Impact": "High",
|
||
"Public": "20230104"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00972",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00972",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00973",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00973",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00974",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00974",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01060",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01060",
|
||
"Impact": "High",
|
||
"Public": "20220802"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2022-2007",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2007",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2008",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2008",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2010",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2010",
|
||
"Impact": "Critical",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2011",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2011",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2156",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2156",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2157",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2157",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2158",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2158",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2160",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2160",
|
||
"Impact": "Low",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2161",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2161",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2162",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2162",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2163",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2163",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2164",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2164",
|
||
"Impact": "Low",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2165",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2165",
|
||
"Impact": "Low",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2294",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2294",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2295",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2295",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2415",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2415",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2477",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2477",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2478",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2478",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2480",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2480",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2481",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2481",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2603",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2603",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2604",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2604",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2605",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2605",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2606",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2606",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2610",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2610",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2612",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2612",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2614",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2614",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2615",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-565",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2615",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2616",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2616",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2617",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2617",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2618",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2618",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2619",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-116",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2619",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2621",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2621",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2624",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2624",
|
||
"Impact": "High",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2743",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2743",
|
||
"Impact": "High",
|
||
"Public": "20230102"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2852",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2852",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2854",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2854",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2855",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2855",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2857",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2857",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2858",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2858",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2859",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2859",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2860",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2860",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2861",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2861",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2998",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2998",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3038",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3038",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3039",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3039",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3040",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3040",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3041",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3041",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3042",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3042",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3043",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3043",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3044",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3044",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3045",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3045",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3046",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3046",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3047",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3047",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3048",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3048",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3049",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3049",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3050",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3050",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3051",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3051",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3052",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3052",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3053",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3053",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3054",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3054",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3055",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3055",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3056",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3056",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3057",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3057",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3058",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3058",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3071",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3071",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3075",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3075",
|
||
"Impact": "Critical",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3195",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3195",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3196",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3196",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3197",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3197",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3198",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3198",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3199",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3199",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3200",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3200",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3201",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3201",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3304",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3304",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3305",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3305",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3306",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3306",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3307",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3307",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3308",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3308",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3309",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3309",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3310",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3310",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3311",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3311",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3312",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-306",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3312",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3313",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3313",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3314",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3314",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3315",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3315",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3316",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3316",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3317",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3317",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3318",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3318",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3370",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3370",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3373",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3373",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3443",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3443",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3444",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3444",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3445",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3445",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3446",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3446",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3447",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3447",
|
||
"Impact": "Low",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3448",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3448",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3449",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3449",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3450",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3450",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3652",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3652",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3653",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3653",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3654",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3654",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3655",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3655",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3656",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3656",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3657",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3657",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3658",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3658",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3659",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3659",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3660",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3660",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3661",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3661",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3723",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3723",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3842",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3842",
|
||
"Impact": "High",
|
||
"Public": "20230102"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3885",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3885",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3886",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3886",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3887",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3887",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3888",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3888",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3889",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3889",
|
||
"Impact": "High",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3890",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3890",
|
||
"Impact": "Critical",
|
||
"Public": "20221109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4135",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4135",
|
||
"Impact": "Critical",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4174",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4174",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4175",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4175",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4176",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4176",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4177",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4177",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4178",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4178",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4179",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4179",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4180",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4180",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4181",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4181",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4182",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4182",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4183",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4183",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4184",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4184",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4185",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4185",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4186",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4186",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4187",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4187",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4188",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4188",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4189",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4189",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4190",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4190",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4191",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4191",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4192",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4192",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4193",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4193",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4194",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4194",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4195",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4195",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4262",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4262",
|
||
"Impact": "High",
|
||
"Public": "20221202"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4436",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4436",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4437",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4437",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4438",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4438",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4440",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4440",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0128",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0128",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0129",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0129",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0130",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0130",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0131",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0131",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0132",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0132",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0133",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0133",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0134",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0134",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0135",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0135",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0136",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0136",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0137",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0137",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0138",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0138",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0139",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0139",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0140",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0140",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0141",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0141",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0471",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0471",
|
||
"Impact": "High",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0472",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0472",
|
||
"Impact": "High",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0473",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0473",
|
||
"Impact": "High",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0474",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0474",
|
||
"Impact": "High",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0696",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0696",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0697",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0697",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0698",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0698",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0699",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0699",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0700",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0700",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0701",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0701",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0702",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0702",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0703",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0703",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0704",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0704",
|
||
"Impact": "Low",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0705",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0705",
|
||
"Impact": "High",
|
||
"Public": "20230207"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0927",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0927",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0928",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0928",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0929",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0929",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0930",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0930",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0931",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0931",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0932",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0932",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0933",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0933",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0941",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0941",
|
||
"Impact": "High",
|
||
"Public": "20230222"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "44986",
|
||
"Href": "https://bugzilla.altlinux.org/44986",
|
||
"Data": "Не использует прокси-сервер, указанный в переменных окружения"
|
||
},
|
||
{
|
||
"ID": "45192",
|
||
"Href": "https://bugzilla.altlinux.org/45192",
|
||
"Data": "Поиск через yandex по умолчанию"
|
||
},
|
||
{
|
||
"ID": "45269",
|
||
"Href": "https://bugzilla.altlinux.org/45269",
|
||
"Data": "chromium падает после вызова справки или недолгой работы"
|
||
},
|
||
{
|
||
"ID": "45454",
|
||
"Href": "https://bugzilla.altlinux.org/45454",
|
||
"Data": "chromium: Браузер очень медленно работает"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:kworkstation:10.1",
|
||
"cpe:/o:alt:workstation:10.1",
|
||
"cpe:/o:alt:server:10.1",
|
||
"cpe:/o:alt:server-v:10.1",
|
||
"cpe:/o:alt:education:10.1",
|
||
"cpe:/o:alt:slinux:10.1",
|
||
"cpe:/o:alt:starterkit:10.1",
|
||
"cpe:/o:alt:kworkstation:10.2",
|
||
"cpe:/o:alt:workstation:10.2",
|
||
"cpe:/o:alt:server:10.2",
|
||
"cpe:/o:alt:server-v:10.2",
|
||
"cpe:/o:alt:education:10.2",
|
||
"cpe:/o:alt:slinux:10.2",
|
||
"cpe:/o:alt:starterkit:10.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231462001",
|
||
"Comment": "chromium-gost is earlier than 0:110.0.5481.177-alt1.p10.1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |