3255 lines
216 KiB
JSON
3255 lines
216 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20237888",
|
||
"Version": "oval:org.altlinux.errata:def:20237888",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2023-7888: package `MySQL` update to version 8.0.35-alt1.1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2023-7888",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-7888",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04284",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04284",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05229",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05229",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05325",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05325",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06415",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06415",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06416",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06416",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06418",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06418",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06419",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06419",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06420",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06420",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06421",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06421",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06422",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06422",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06423",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06423",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06424",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06424",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06425",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06425",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06426",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06426",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06427",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06427",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06428",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06428",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06429",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06429",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06430",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06430",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06431",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06431",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06432",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06432",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06433",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06433",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06434",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06434",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06436",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06436",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06437",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06437",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06438",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06438",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06558",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06558",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06565",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06565",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07403",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07403",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00414",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00414",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00415",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00415",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00427",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00427",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00428",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00428",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00429",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00429",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00430",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00430",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00431",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00431",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00432",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00432",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00433",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00433",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00434",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00434",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00435",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00435",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00436",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00436",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00437",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00437",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00440",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00440",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00441",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00441",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00442",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00442",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00443",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00443",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00445",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00445",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00446",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00446",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00448",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00448",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00675",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00675",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02157",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02157",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02281",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02281",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02282",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02282",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02283",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02283",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02284",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02284",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02286",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02286",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02288",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02288",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02290",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02290",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02333",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02333",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02339",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02339",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02360",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02360",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02476",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02476",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02477",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02477",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02478",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02478",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02481",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02481",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02483",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02483",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02491",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02491",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02492",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02492",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02493",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02493",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02499",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02499",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02502",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02502",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02503",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02503",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02509",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02509",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02512",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02512",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03652",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03652",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03939",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03939",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03990",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03990",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04201",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04201",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04207",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04207",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04222",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04222",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04223",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04223",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04224",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04224",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04226",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04226",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04275",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04275",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04278",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04278",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04279",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04279",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04352",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04352",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04353",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04353",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06576",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06576",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06890",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06890",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06891",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06891",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06892",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06892",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06893",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06893",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06894",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06894",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06895",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06895",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06896",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06896",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06897",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06897",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06898",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06898",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06899",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06899",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06900",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06900",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06902",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06902",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06903",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06903",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06910",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06910",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06912",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06912",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-06913",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-06913",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07053",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07053",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07078",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07078",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07093",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07093",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07097",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07097",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07099",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07099",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07100",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07100",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07101",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07101",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07105",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07105",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10735",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10735",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36242",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36242",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2097",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2097",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21589",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21589",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21592",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21592",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21594",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21594",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21595",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21595",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21599",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21599",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21600",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21600",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21604",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21604",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21605",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21605",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21607",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21607",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21608",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21608",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21611",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21611",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21617",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21617",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21625",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21625",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21632",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21632",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21633",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21633",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21635",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21635",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21637",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21637",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21638",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21638",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21640",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21640",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-21641",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21641",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-32221",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32221",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-37434",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39400",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39400",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39402",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39402",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39403",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39403",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39408",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39408",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39410",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39410",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-43551",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-43551",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4899",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4899",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0215",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0215",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21836",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21836",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21840",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21840",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21863",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21863",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21864",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21864",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21865",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21865",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21866",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21866",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21867",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21867",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21868",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21868",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21869",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21869",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21870",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21870",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21871",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21871",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21873",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21873",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21874",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21874",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21875",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21875",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21876",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21876",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21877",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21877",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21878",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21878",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21879",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21879",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21880",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21880",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21881",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21881",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21882",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21882",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21883",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21883",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21887",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21887",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21911",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21911",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21912",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21912",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21913",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21913",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21917",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21917",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21919",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21919",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21920",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21920",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21929",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21929",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21933",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21933",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21935",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21935",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21940",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21940",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21946",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21946",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21947",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21947",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21950",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21950",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21953",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21953",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21955",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21955",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21962",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21962",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21963",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21963",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21966",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21966",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21972",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21972",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21977",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21977",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21980",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21980",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-21982",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21982",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22005",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22005",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22007",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22007",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22008",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22008",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22015",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22015",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22026",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22026",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22028",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22028",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22032",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22032",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22033",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22033",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22038",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22038",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22046",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22046",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22048",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22048",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22053",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22053",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22054",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22054",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22056",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22056",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22057",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22057",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22058",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22058",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22059",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22059",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22064",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22064",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22065",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22065",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22066",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22066",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22068",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22068",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22070",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22070",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22079",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22079",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22084",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22084",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22092",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22092",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22097",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22097",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22103",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22103",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22104",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22104",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22110",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22110",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22113",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22113",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22114",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22114",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22115",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22115",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2650",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2650",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38545",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades MySQL to version 8.0.35-alt1.1. \nSecurity Fix(es):\n\n * BDU:2022-04284: Уязвимость режима AES OCB библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05229: Уязвимость пакета cryptography интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05325: Уязвимость компонента inflate.c библиотеки zlib, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06415: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06416: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06417: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06418: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06419: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06420: Уязвимость компонента C API системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06421: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06422: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06423: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2022-06424: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06425: Уязвимость компонента Server: Security: Encryption системы управления базами данных MySQL Server, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06426: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06427: Уязвимость компонента Server: Connection Handling системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06428: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06429: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06430: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06431: Уязвимость компонента Server: Data Dictionary системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06432: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06433: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06434: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06436: Уязвимость компонента Server: Replication системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06437: Уязвимость компонента Shell: Core Client клиента командной строки и редактора кода Oracle MySQL Shell, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2022-06438: Уязвимость компонента Shell: Core Client клиента командной строки и редактора кода Oracle MySQL Shell, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2022-06558: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06565: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07403: Уязвимость утилиты командной строки cURL, связанная с логической ошибкой повторно используемого дескриптора при обработке последующих HTTP-запросов PUT и POST, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2023-00414: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2023-00415: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2023-00417: Уязвимость компонента Server: GIS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00427: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00428: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00429: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00430: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00431: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2023-00432: Уязвимость компонента Server: Security: Encryption системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2023-00433: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00434: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00435: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00436: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00437: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00440: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных\n\n * BDU:2023-00441: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00442: Уязвимость компонента Server: Thread Pooling системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00443: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2023-00444: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00445: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00446: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00448: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00675: Уязвимость функции BIO_new_NDEF() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02157: Уязвимость механизма HSTS (HTTP Strict Transport Security) утилиты командной строки cURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-02281: Уязвимость компонента Server: Components Services системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02282: Уязвимость компонента Server: Components Services системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02283: Уязвимость компонента Server: Partition системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02284: Уязвимость компонента Server: Partition системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02286: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02288: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02290: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, связанная с недостаточной проверкой входных данных\n\n * BDU:2023-02333: Уязвимость компонента Server: Connection Handling системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02339: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать зависание или вызвать отказ в обслуживании\n\n * BDU:2023-02360: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02476: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02477: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать зависание или отказ в обслуживании\n\n * BDU:2023-02478: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02481: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02483: Уязвимость компонента Server: DDL системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02491: Уязвимость компонента Server: DDL системы управления базами данных MySQL Server, позволяющая нарушителю получить привилегированный доступ или вызвать отказ в обслуживании\n\n * BDU:2023-02492: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02493: Уязвимость компонента Server: DDL системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ на изменение, добавление или удаление данных\n\n * BDU:2023-02499: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02502: Уязвимость компонента Server: Components Services системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02503: Уязвимость компонента Server: JSON системы управления базами данных MySQL Server , позволяющая нарушителю получить привилегированный доступ или вызвать отказ в обслуживании\n\n * BDU:2023-02509: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02512: Уязвимость компонента Client programs системы управления базами данных MySQL Server, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-03652: Уязвимость библиотеки OpenSSL, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03939: Уязвимость компонента Server:Pluggable Auth системы управления базами данных Oracle MySQL Serve, позволяющая нарушителю получить несанкционированный доступ к конфиденциальной информации\n\n * BDU:2023-03990: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04201: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04207: Уязвимость компонента InnoDB системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04222: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04223: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04224: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04226: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04275: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2023-04278: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04279: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04352: Уязвимость компонента Client programs системы управления базами данных MySQL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-04353: Уязвимость компонента Server: DDL системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-06576: Уязвимость реализации протокола SOCKS5 утилиты командной строки cURL, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2023-06890: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06891: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06892: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06893: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06894: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06895: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06896: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06897: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06898: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06899: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»\n\n * BDU:2023-06900: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-06902: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-06903: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-06910: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-06912: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-06913: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07053: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07078: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07093: Уязвимость компонента Server: UDF системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2023-07097: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2023-07099: Уязвимость компонента Server: Security: Encryption системы управления базами данных Oracle MySQL Server, связанная с некорректным контролем доступа, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2023-07100: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2023-07101: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2023-07105: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * CVE-2020-10735: A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.\n\n * CVE-2020-36242: In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.\n\n * CVE-2022-2097: AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).\n\n * CVE-2022-21589: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.39 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2022-21592: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2022-21594: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21595: Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21599: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21600: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2022-21604: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21605: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21607: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21608: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21611: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21617: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21625: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21632: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21633: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21635: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).\n\n * CVE-2022-21637: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21638: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21640: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21641: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-32221: When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\n\n * CVE-2022-37434: zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n\n * CVE-2022-39400: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-39402: Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. While the vulnerability is in MySQL Shell, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).\n\n * CVE-2022-39403: Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Shell accessible data as well as unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 3.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).\n\n * CVE-2022-39408: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-39410: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-43551: A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.\n\n * CVE-2022-4899: A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.\n\n * CVE-2023-0215: The public API function BIO_new_NDEF is a helper function used for streaming\nASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the\nSMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by\nend user applications.\n\nThe function receives a BIO from the caller, prepends a new BIO_f_asn1 filter\nBIO onto the front of it to form a BIO chain, and then returns the new head of\nthe BIO chain to the caller. Under certain conditions, for example if a CMS\nrecipient public key is invalid, the new filter BIO is freed and the function\nreturns a NULL result indicating a failure. However, in this case, the BIO chain\nis not properly cleaned up and the BIO passed by the caller still retains\ninternal pointers to the previously freed filter BIO. If the caller then goes on\nto call BIO_pop() on the BIO then a use-after-free will occur. This will most\nlikely result in a crash.\n\n\n\nThis scenario occurs directly in the internal function B64_write_ASN1() which\nmay cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on\nthe BIO. This internal function is in turn called by the public API functions\nPEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,\nSMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.\n\nOther public API functions that may be impacted by this include\ni2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and\ni2d_PKCS7_bio_stream.\n\nThe OpenSSL cms and smime command line applications are similarly affected.\n\n\n\n\n\n * CVE-2023-21836: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21840: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.40 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21863: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21864: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21865: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21866: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21867: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21868: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21869: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2023-21870: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21871: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21872: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2023-21873: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21874: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2023-21875: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).\n\n * CVE-2023-21876: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21877: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2023-21878: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21879: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21880: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2023-21881: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21882: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2023-21883: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21887: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21911: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21912: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.41 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21913: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21917: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21919: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21920: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21929: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2023-21933: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21935: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21940: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21945: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21946: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21947: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21950: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21953: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21955: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21962: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21963: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.40 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2023-21966: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21972: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21976: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21977: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-21980: Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).\n\n * CVE-2023-21982: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22005: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22007: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22008: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22015: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22026: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22028: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.43 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22032: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22033: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22038: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2023-22046: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22048: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2023-22053: Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.7.42 and prior and 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H).\n\n * CVE-2023-22054: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22056: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22057: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22058: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22059: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22064: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22065: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22066: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22068: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22070: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22078: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22079: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22084: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22092: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22095: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). The supported version that is affected is 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22097: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22103: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22104: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22110: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22111: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22112: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22113: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2023-22114: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-22115: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2023-2650: Issue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with 'n' being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer's certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.\n\n * CVE-2023-38545: This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n\n\n * #48120: На версию MySQL 8.0.30-alt2 накопилось 139 незакрытых CVE",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2023-12-10"
|
||
},
|
||
"Updated": {
|
||
"Date": "2023-12-10"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-04284",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-325",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04284",
|
||
"Impact": "Low",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05229",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-190, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05229",
|
||
"Impact": "Critical",
|
||
"Public": "20210207"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05325",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05325",
|
||
"Impact": "Critical",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06415",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06415",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06416",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06416",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06417",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06417",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06418",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06418",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06419",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06419",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06420",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06420",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06421",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06421",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06422",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06422",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06423",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06423",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06424",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06424",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06425",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06425",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06426",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06426",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06427",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06427",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06428",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06428",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06429",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06429",
|
||
"Impact": "High",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06430",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06430",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06431",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06431",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06432",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06432",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06433",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06433",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06434",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06434",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06436",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06436",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06437",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06437",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06438",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06438",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06558",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06558",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06565",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06565",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07403",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-200, CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07403",
|
||
"Impact": "Critical",
|
||
"Public": "20221205"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00414",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00414",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00415",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00415",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00417",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00417",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00427",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00427",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00428",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00428",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00429",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00429",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00430",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00430",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00431",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00431",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00432",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:N/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00432",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00433",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00433",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00434",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00434",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00435",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00435",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00436",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00436",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00437",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00437",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00440",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00440",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00441",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00441",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00442",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00442",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00443",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00443",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00444",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00444",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00445",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00445",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00446",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00446",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00448",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00448",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00675",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00675",
|
||
"Impact": "Low",
|
||
"Public": "20221129"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02157",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-319",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02157",
|
||
"Impact": "High",
|
||
"Public": "20221029"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02281",
|
||
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02281",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02282",
|
||
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02282",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02283",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02283",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02284",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02284",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02286",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02286",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02288",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02288",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02290",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02290",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02333",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02333",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02339",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02339",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02360",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02360",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02476",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02476",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02477",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02477",
|
||
"Impact": "High",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02478",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02478",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02481",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02481",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02483",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02483",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02491",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02491",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02492",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02492",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02493",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02493",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02499",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02499",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02502",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02502",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02503",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02503",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02509",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02509",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02512",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02512",
|
||
"Impact": "High",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03652",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399, CWE-400, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03652",
|
||
"Impact": "High",
|
||
"Public": "20230530"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03939",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03939",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03990",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03990",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04201",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04201",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04207",
|
||
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04207",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04222",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04222",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04223",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04223",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04224",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04224",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04226",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04226",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04275",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04275",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04278",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04278",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04279",
|
||
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04279",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04352",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04352",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04353",
|
||
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04353",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06576",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06576",
|
||
"Impact": "High",
|
||
"Public": "20230930"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06890",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06890",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06891",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06891",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06892",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06892",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06893",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06893",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06894",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06894",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06895",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06895",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06896",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06896",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06897",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06897",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06898",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06898",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06899",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06899",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06900",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06900",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06902",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06902",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06903",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06903",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06910",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20, CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06910",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06912",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06912",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-06913",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-06913",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07053",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07053",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07078",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07078",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07093",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07093",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07097",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07097",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07099",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07099",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07100",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07100",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07101",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07101",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07105",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07105",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-10735",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10735",
|
||
"Impact": "High",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36242",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36242",
|
||
"Impact": "Critical",
|
||
"Public": "20210207"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2097",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2097",
|
||
"Impact": "Low",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21589",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21589",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21592",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21592",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21594",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21594",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21595",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21595",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21599",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21599",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21600",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21600",
|
||
"Impact": "High",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21604",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21604",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21605",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21605",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21607",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21607",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21608",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21608",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21611",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21611",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21617",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21617",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21625",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21625",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21632",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21632",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21633",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21633",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21635",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21635",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21637",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21637",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21638",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21638",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21640",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21640",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-21641",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21641",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-32221",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32221",
|
||
"Impact": "Critical",
|
||
"Public": "20221205"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-37434",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434",
|
||
"Impact": "Critical",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39400",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39400",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39402",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39402",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39403",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39403",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39408",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39408",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39410",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39410",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-43551",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-319",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-43551",
|
||
"Impact": "High",
|
||
"Public": "20221223"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4899",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4899",
|
||
"Impact": "High",
|
||
"Public": "20230331"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0215",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0215",
|
||
"Impact": "High",
|
||
"Public": "20230208"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21836",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21836",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21840",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21840",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21863",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21863",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21864",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21864",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21865",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21865",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21866",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21866",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21867",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21867",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21868",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21868",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21869",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21869",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21870",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21870",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21871",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21871",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21872",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21872",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21873",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21873",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21874",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21874",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21875",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21875",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21876",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21876",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21877",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21877",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21878",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21878",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21879",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21879",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21880",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21880",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21881",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21881",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21882",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21882",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21883",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21883",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21887",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21887",
|
||
"Impact": "Low",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21911",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21911",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21912",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21912",
|
||
"Impact": "High",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21913",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21913",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21917",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21917",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21919",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21919",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21920",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21920",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21929",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21929",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21933",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21933",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21935",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21935",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21940",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21940",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21945",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21945",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21946",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21946",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21947",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21947",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21950",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21950",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21953",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21953",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21955",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21955",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21962",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21962",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21963",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21963",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21966",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21966",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21972",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21972",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21976",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21976",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21977",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21977",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21980",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21980",
|
||
"Impact": "High",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-21982",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21982",
|
||
"Impact": "Low",
|
||
"Public": "20230418"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22005",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22005",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22007",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22007",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22008",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22008",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22015",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22015",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22026",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22026",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22028",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22028",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22032",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22032",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22033",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22033",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22038",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22038",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22046",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22046",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22048",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22048",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22053",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22053",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22054",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22054",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22056",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22056",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22057",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22057",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22058",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22058",
|
||
"Impact": "Low",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22059",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22059",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22064",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22064",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22065",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22065",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22066",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22066",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22068",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22068",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22070",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22070",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22078",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22078",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22079",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22079",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22084",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22084",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22092",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22092",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22095",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22095",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22097",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22097",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22103",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22103",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22104",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22104",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22110",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22110",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22111",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22111",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22112",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22112",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22113",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22113",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22114",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22114",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22115",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22115",
|
||
"Impact": "Low",
|
||
"Public": "20231017"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2650",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2650",
|
||
"Impact": "Low",
|
||
"Public": "20230530"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38545",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545",
|
||
"Impact": "Critical",
|
||
"Public": "20231018"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "48120",
|
||
"Href": "https://bugzilla.altlinux.org/48120",
|
||
"Data": "На версию MySQL 8.0.30-alt2 накопилось 139 незакрытых CVE"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20237888001",
|
||
"Comment": "MySQL-client is earlier than 0:8.0.35-alt1.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20237888002",
|
||
"Comment": "MySQL-server is earlier than 0:8.0.35-alt1.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20237888003",
|
||
"Comment": "MySQL-server-perl is earlier than 0:8.0.35-alt1.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20237888004",
|
||
"Comment": "libmysqlclient21 is earlier than 0:8.0.35-alt1.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20237888005",
|
||
"Comment": "libmysqlclient21-devel is earlier than 0:8.0.35-alt1.1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |