3237 lines
191 KiB
JSON
3237 lines
191 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20192486",
|
||
"Version": "oval:org.altlinux.errata:def:20192486",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2019-2486: package `firefox-esr` update to version 68.0.2-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2019-2486",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2486",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01122",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01122",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01333",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01333",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01334",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01334",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01368",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01368",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01442",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01442",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00508",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00508",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00678",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00678",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00679",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00679",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00680",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00680",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00681",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00681",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00819",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00819",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00820",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00820",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00821",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00821",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00919",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00919",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00920",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00920",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01276",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01276",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01277",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01277",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01422",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01422",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01423",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01423",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01424",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01424",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01425",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01425",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01426",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01426",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01556",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01556",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01557",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01557",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01568",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01568",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01569",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01569",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01950",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01950",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02851",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02851",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02932",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02932",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02933",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02933",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02934",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02934",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02935",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02935",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02947",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02947",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03329",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03329",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03411",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03411",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03412",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03412",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03413",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03413",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03414",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03414",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03415",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03415",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03461",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03461",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03462",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03462",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03463",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03463",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03464",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03464",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03465",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03465",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03466",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03466",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03467",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03467",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03468",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03468",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03469",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03469",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03471",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03471",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03558",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03558",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03559",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03559",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03561",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03561",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03614",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03614",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03615",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03615",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03616",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03616",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04024",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04024",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04250",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04250",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04291",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04291",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04295",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04295",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04296",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04296",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04297",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04297",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04298",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04298",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04299",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04299",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04300",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04300",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04301",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04301",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04302",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04302",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04303",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04303",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04304",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04304",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04305",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04305",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04569",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04569",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04581",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04581",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04582",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04582",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04635",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04635",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04637",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04637",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04638",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04638",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04639",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04639",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04640",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04640",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04642",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04642",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00585",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00585",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00586",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00586",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00587",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00587",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00588",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00588",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00589",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00589",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00590",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00590",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00591",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00591",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00592",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00592",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00593",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00593",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00594",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00594",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00595",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00595",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00596",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00596",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00597",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00597",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00598",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00598",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00599",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00599",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00600",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00600",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00601",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00601",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00602",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00602",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00603",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00603",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00604",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00604",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00605",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00605",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00606",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00606",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00607",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00607",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00608",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00608",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00609",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00609",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00610",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00610",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00723",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00723",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00746",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00746",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00747",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00747",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00771",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00771",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00782",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00782",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00783",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00783",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00784",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00784",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12358",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12358",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12359",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12359",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12360",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12360",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12361",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12361",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12362",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12362",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12363",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12363",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12364",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12364",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12365",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12365",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12366",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12366",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12367",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12367",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12369",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12369",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12370",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12370",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12371",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12371",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12375",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12375",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12376",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12376",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12377",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12377",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12378",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12378",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12379",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12379",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12383",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12383",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12385",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12385",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12386",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12386",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12387",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12387",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12388",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12388",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12390",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12392",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12392",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12393",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12393",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12395",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12395",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12396",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12396",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12397",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12397",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12398",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12398",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12399",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12399",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12401",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12401",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12402",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12402",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12403",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12403",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12405",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12405",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12406",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12406",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12407",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12407",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18492",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18492",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18493",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18493",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18494",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18494",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18495",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18495",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18497",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18497",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18498",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18498",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18499",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18499",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18500",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18500",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18501",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18501",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18502",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18502",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18503",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18503",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18504",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18504",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18505",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18505",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18506",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18506",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18510",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18510",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5186",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5186",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5187",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5187",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5188",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5188",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11691",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11691",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11692",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11692",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11695",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11695",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11697",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11697",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11698",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11698",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11699",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11699",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11701",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11701",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11708",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11708",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11709",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11709",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11710",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11710",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11711",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11711",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11712",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11712",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11713",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11713",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11714",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11714",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11715",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11715",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11716",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11716",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11717",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11717",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11718",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11718",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11719",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11719",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11720",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11720",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11721",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11721",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11723",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11723",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11724",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11724",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11725",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11725",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11727",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11727",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11728",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11728",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11729",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11730",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11730",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11733",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11733",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9788",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9788",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9789",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9789",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9790",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9790",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9791",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9791",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9792",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9792",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9793",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9793",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9795",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9795",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9796",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9796",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9797",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9797",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9799",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9799",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9800",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9800",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9802",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9802",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9803",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9803",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9805",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9805",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9806",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9806",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9807",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9807",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9808",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9808",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9809",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9809",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9810",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9810",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9811",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9811",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9813",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9813",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9814",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9814",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9816",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9816",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9817",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9817",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9819",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9819",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9820",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9820",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9821",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9821",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades firefox-esr to version 68.0.2-alt1. \nSecurity Fix(es):\n\n * BDU:2018-01122: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-01333: Уязвимость веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения\n\n * BDU:2018-01334: Уязвимость компонента IndexedDB веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения\n\n * BDU:2018-01368: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ситуацией гонки в обработчике сигнала, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2018-01442: Уязвимость обработчика JavaScript-сценариев веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-00508: Уязвимость механизма записи потока мультимедиа веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с некорректной проверкой типа источника данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00678: Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-00679: Уязвимость браузера Firefox, связанная с ошибками освобождения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00680: Уязвимость компонента Texture Client Handler браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00681: Уязвимость компонента Proxy Auto-Config браузера Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и произвести атаки на службы и инструменты, привязанные к локальному хосту\n\n * BDU:2019-00819: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды\n\n * BDU:2019-00820: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-00821: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-00919: Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-00920: Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с обращением к освобожденной ячейке памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01276: Уязвимость метода Array.prototype.slice JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-01277: Уязвимость функции of __proto__ mutations JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-01422: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-01423: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю осуществить запись за границами буфера в памяти\n\n * BDU:2019-01424: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-01425: Уязвимость графической библиотеки Skia веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-01426: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю перенаправить пользователя на вредоносный сайт\n\n * BDU:2019-01556: Уязвимость браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01557: Уязвимость JIT-компилятора IonMonkey браузеров Firefox и Firefox ESR, связанная с ошибкой преобразования типов данных, позволяющая нарушителю оказать воздействие на целостность защищаемых данных\n\n * BDU:2019-01568: Уязвимость just-in-time (JIT) компилятора IonMonkey веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с записью данных за пределы границ буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01569: Уязвимость веб-браузеров Firefox, Firefox ESR, Firefox и программы для работы с электронной почтой Thunderbird, связанная с чтением данных за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным\n\n * BDU:2019-01950: Уязвимость программного обеспечения Firefox, Firefox ESR и Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-02851: Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-02932: Уязвимость реализации сетевого протокола HTTP/2 браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02933: Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02934: Уязвимость плагина NPAPI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую подделку запросов\n\n * BDU:2019-02935: Уязвимость компонента document.domain браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую сценарную атаку\n\n * BDU:2019-02947: Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, существующая из-за недостаточной проверки параметров в сообщениях Prompt:Open IPC между дочерним и родительским процессами, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03329: Уязвимость браузера Firefox, связанная с выходом операции за границы буфера данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03411: Уязвимость кросс-браузерной системы для разработки дополнений WebExtensions веб-браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-03412: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с хранением паролей в незашифрованном виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-03413: Уязвимость компонента TransportSecurityInfo веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03414: Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03415: Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03461: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-03462: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-03463: Уязвимость функции SwizzleData браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-03464: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная целочисленным переполнением, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-03465: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-03466: Уязвимость плагина NPAPI браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-03467: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками межпроцессного взаимодействия (IPC), позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03468: Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с недопустимым размером сетки во время QCMS-преобразований, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03469: Уязвимость компонента PerformanceNavigationTiming браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03471: Уязвимость библиотеки Skia браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03558: Уязвимость компонента API XMLHttpRequest браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-03559: Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-03561: Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2019-03614: Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным синтаксическим анализом содержимого страницы или интерпретацией введенных пользователем данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03615: Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с ошибками экранирования символа каретки(\u0026quot;^\u0026quot;), позволяющая нарушителю нарушить целостность данных\n\n * BDU:2019-03616: Уязвимость библиотеки служб сетевой безопасности (NSS) почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2019-04024: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04250: Уязвимость браузера Firefox, связанная с использованием открытой переадресации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04291: Уязвимость функции Reader View браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04295: Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04296: Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границы буфера памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04297: Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04298: Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04299: Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-04300: Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к локальным файлам\n\n * BDU:2019-04301: Уязвимость браузера Firefox, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю обойти защитный механизм CSP\n\n * BDU:2019-04302: Уязвимость компонента API браузера Firefox, позволяющая нарушителю подменить пользовательский интерфейс\n\n * BDU:2019-04303: Уязвимость браузера Firefox, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04304: Уязвимость компонента WebBrowserPersist браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04305: Уязвимость браузера Firefox, вызванная отсутствием предупреждения о смешанном содержимом, когда компонент веб-страницы favicon загружается через HTTP, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04569: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04581: Уязвимость браузера Firefox, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04582: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04635: Уязвимость обработчика событий браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04637: Уязвимость объекта canvas браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04638: Уязвимость функций работы с объектами JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальной информации и вызвать отказ в обслуживании\n\n * BDU:2019-04639: Уязвимость функций соответствия отсеков JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04640: Уязвимость безопасности памяти браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании и нарушить целостность данных\n\n * BDU:2019-04642: Уязвимость функции формирования открытых ключей p256-ECDH браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00585: Уязвимость функции AssertWorkerThread браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00586: Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00587: Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00588: Уязвимость расширения WebRTC браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00589: Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00590: Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00591: Уязвимость библиотеки Prio браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00592: Уязвимость спецификации Upgrade-Insecure-Requests браузера Firefox, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2020-00593: Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00594: Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00595: Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00596: Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00597: Уязвимость браузера Firefox, связанная с ошибкой службы сетевой безопасности CertificateVerify, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00598: Уязвимость браузера Firefox, связанная с ошибками в настройках разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2020-00599: Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00600: Уязвимость браузера Firefox, связанная с ошибкой кодировки латинского символа kra, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00601: Уязвимость браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00602: Уязвимость реализации страницы Activity Stream браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00603: Уязвимость компонента window.globalThis браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00604: Уязвимость сетевой библиотеки Necko браузера Firefox, связанная с ошибкой доступа к дочернему элементу при неправильном потоке во время UDP-соединения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00605: Уязвимость идентификатора ресурсов webcal браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00606: Уязвимость браузера Firefox, связанная с ошибкой отображения доменного имени в адресной строке, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00607: Уязвимость браузера Firefox, связанная с некорректной установкой приложений при нажатых клавиш на клавиатуре (ALT + a), позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00608: Уязвимость браузера Firefox, связанная с ошибками обработки исполняемого контента для приложений с расширением .JNLP, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00609: Уязвимость браузера Firefox, связанная с ошибкой определения пользовательского курсора, который может находиться над адресной строкой, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00610: Уязвимость компонента WebExtension браузера Firefox, связанная с некорректным ограничением URI, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00723: Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-00746: Уязвимость контроллера анимации SMIL почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-00747: Уязвимость компилятора IonMonkey Just-in-Time почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным преобразованием типов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00771: Уязвимость функции createImageBitmap браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-00782: Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00783: Уязвимость модуля VertexBuffer11 браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00784: Уязвимость компонента WebExtension браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * CVE-2018-12358: Service workers can use redirection to avoid the tainting of cross-origin resources in some instances, allowing a malicious site to read responses which are supposed to be opaque. This vulnerability affects Firefox \u003c 61.\n\n * CVE-2018-12359: A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12360: A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12361: An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, and Firefox \u003c 61.\n\n * CVE-2018-12362: An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12363: A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12364: NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12365: A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12366: An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-12367: In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, and Firefox \u003c 61.\n\n * CVE-2018-12369: WebExtensions bundled with embedded experiments were not correctly checked for proper authorization. This allowed a malicious WebExtension to gain full browser permissions. This vulnerability affects Firefox ESR \u003c 60.1 and Firefox \u003c 61.\n\n * CVE-2018-12370: In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox \u003c 61.\n\n * CVE-2018-12371: An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.1, Thunderbird \u003c 60, and Firefox \u003c 61.\n\n * CVE-2018-12375: Memory safety bugs present in Firefox 61. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 62.\n\n * CVE-2018-12376: Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12377: A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12378: A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12379: When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12383: If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2.1, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12385: A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird \u003c 60.2.1, Firefox ESR \u003c 60.2.1, and Firefox \u003c 62.0.2.\n\n * CVE-2018-12386: A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR \u003c 60.2.2 and Firefox \u003c 62.0.3.\n\n * CVE-2018-12387: A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR \u003c 60.2.2 and Firefox \u003c 62.0.3.\n\n * CVE-2018-12388: Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 63.\n\n * CVE-2018-12390: Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.\n\n * CVE-2018-12392: When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.\n\n * CVE-2018-12393: A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox \u003c 63, Firefox ESR \u003c 60.3, and Thunderbird \u003c 60.3.\n\n * CVE-2018-12395: By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR \u003c 60.3 and Firefox \u003c 63.\n\n * CVE-2018-12396: A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR \u003c 60.3 and Firefox \u003c 63.\n\n * CVE-2018-12397: A WebExtension can request access to local files without the warning prompt stating that the extension will \"Access your data for all websites\" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR \u003c 60.3 and Firefox \u003c 63.\n\n * CVE-2018-12398: By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox \u003c 63.\n\n * CVE-2018-12399: When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox \u003c 63.\n\n * CVE-2018-12401: Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox \u003c 63.\n\n * CVE-2018-12402: The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of \"Save Page As...\" functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the \"Save Page As...\" menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox \u003c 63.\n\n * CVE-2018-12403: If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox \u003c 63.\n\n * CVE-2018-12405: Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60.4, Firefox ESR \u003c 60.4, and Firefox \u003c 64.\n\n * CVE-2018-12406: Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 64.\n\n * CVE-2018-12407: A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content, when working with the VertexBuffer11 module. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 64.\n\n * CVE-2018-18492: A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.4, Firefox ESR \u003c 60.4, and Firefox \u003c 64.\n\n * CVE-2018-18493: A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.4, Firefox ESR \u003c 60.4, and Firefox \u003c 64.\n\n * CVE-2018-18494: A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird \u003c 60.4, Firefox ESR \u003c 60.4, and Firefox \u003c 64.\n\n * CVE-2018-18495: WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox \u003c 64.\n\n * CVE-2018-18497: Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox \u003c 64.\n\n * CVE-2018-18498: A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird \u003c 60.4, Firefox ESR \u003c 60.4, and Firefox \u003c 64.\n\n * CVE-2018-18499: A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv=\"refresh\" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-18500: A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.5, Firefox ESR \u003c 60.5, and Firefox \u003c 65.\n\n * CVE-2018-18501: Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60.5, Firefox ESR \u003c 60.5, and Firefox \u003c 65.\n\n * CVE-2018-18502: Mozilla developers and community members reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 65.\n\n * CVE-2018-18503: When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. This vulnerability affects Firefox \u003c 65.\n\n * CVE-2018-18504: A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox \u003c 65.\n\n * CVE-2018-18505: An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird \u003c 60.5, Firefox ESR \u003c 60.5, and Firefox \u003c 65.\n\n * CVE-2018-18506: When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox \u003c 65.\n\n * CVE-2018-18510: The about:crashcontent and about:crashparent pages can be triggered by web content. These pages are used to crash the loaded page or the browser for test purposes. This issue allows for a non-persistent denial of service (DOS) attack by a malicious site which links to these pages. This vulnerability affects Firefox \u003c 64.\n\n * CVE-2018-5156: A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2018-5186: Memory safety bugs present in Firefox 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 61.\n\n * CVE-2018-5187: Memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, and Firefox \u003c 61.\n\n * CVE-2018-5188: Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.\n\n * CVE-2019-11691: A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-11692: A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-11695: A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface. This vulnerability affects Firefox \u003c 67.\n\n * CVE-2019-11696: Files with the .JNLP extension used for \"Java web start\" applications are not treated as executable content for download prompts even though they can be executed if Java is installed on the local system. This could allow users to mistakenly launch an executable binary locally. This vulnerability affects Firefox \u003c 67.\n\n * CVE-2019-11697: If the ALT and \"a\" keys are pressed when users receive an extension installation prompt, the extension will be installed without the install prompt delay that keeps the prompt visible in order for users to accept or decline the installation. A malicious web page could use this with spoofing on the page to trick users into installing a malicious extension. This vulnerability affects Firefox \u003c 67.\n\n * CVE-2019-11698: If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-11699: A malicious page can briefly cause the wrong name to be highlighted as the domain name in the addressbar during page navigations. This could result in user confusion of which site is currently loaded for spoofing attacks. This vulnerability affects Firefox \u003c 67.\n\n * CVE-2019-11701: The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks. This default was left in place as a legacy feature and has now been removed. *Note: this issue only affects users with an account on the vulnerable service. Other users are unaffected.*. This vulnerability affects Firefox \u003c 67.\n\n * CVE-2019-11708: Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR \u003c 60.7.2, Firefox \u003c 67.0.4, and Thunderbird \u003c 60.7.2.\n\n * CVE-2019-11709: Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11710: Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11711: When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11712: POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11713: A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11714: Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11715: Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11716: Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11717: A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11718: Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11719: When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11720: Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11721: The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11723: A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11724: Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11725: When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11728: The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.\n\n * CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11730: A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-11733: When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox \u003c 68.0.2 and Firefox ESR \u003c 68.0.2.\n\n * CVE-2019-9788: Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9789: Mozilla developers and community members reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9790: A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9791: The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9792: The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9793: A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9795: A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9796: A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.\n\n * CVE-2019-9797: Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9799: Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9800: Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-9802: If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9803: The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9805: A latent vulnerability exists in the Prio library where data may be read from uninitialized memory for some functions, leading to potential memory corruption. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9806: A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9807: When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9808: If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states \"Unknown origin\" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9809: If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox \u003c 66.\n\n * CVE-2019-9810: Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.\n\n * CVE-2019-9811: As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\n\n * CVE-2019-9813: Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox \u003c 66.0.1, Firefox ESR \u003c 60.6.1, and Thunderbird \u003c 60.6.1.\n\n * CVE-2019-9814: Mozilla developers and community members reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 67.\n\n * CVE-2019-9816: A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-9817: Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-9819: A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-9820: A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.7, Firefox \u003c 67, and Firefox ESR \u003c 60.7.\n\n * CVE-2019-9821: A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 67.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2019-08-15"
|
||
},
|
||
"Updated": {
|
||
"Date": "2019-08-15"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2018-01122",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01122",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01333",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01333",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01334",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01334",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01368",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-364, CWE-366",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01368",
|
||
"Impact": "High",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01442",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01442",
|
||
"Impact": "High",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00508",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00508",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00678",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00678",
|
||
"Impact": "High",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00679",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00679",
|
||
"Impact": "Low",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00680",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00680",
|
||
"Impact": "High",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00681",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00681",
|
||
"Impact": "High",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00819",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00819",
|
||
"Impact": "High",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00820",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00820",
|
||
"Impact": "Critical",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00821",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00821",
|
||
"Impact": "Critical",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00919",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00919",
|
||
"Impact": "Critical",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00920",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00920",
|
||
"Impact": "Critical",
|
||
"Public": "20190129"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01276",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01276",
|
||
"Impact": "High",
|
||
"Public": "20190322"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01277",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01277",
|
||
"Impact": "High",
|
||
"Public": "20190322"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01422",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01422",
|
||
"Impact": "Critical",
|
||
"Public": "20181211"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01423",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01423",
|
||
"Impact": "Critical",
|
||
"Public": "20181211"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01424",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01424",
|
||
"Impact": "Critical",
|
||
"Public": "20181211"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01425",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01425",
|
||
"Impact": "Critical",
|
||
"Public": "20181211"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01426",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01426",
|
||
"Impact": "Low",
|
||
"Public": "20181211"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01556",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01556",
|
||
"Impact": "High",
|
||
"Public": "20190319"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01557",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01557",
|
||
"Impact": "High",
|
||
"Public": "20190319"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01568",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01568",
|
||
"Impact": "High",
|
||
"Public": "20190319"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01569",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01569",
|
||
"Impact": "High",
|
||
"Public": "20190319"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01950",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01950",
|
||
"Impact": "Critical",
|
||
"Public": "20190319"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02851",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02851",
|
||
"Impact": "Critical",
|
||
"Public": "20190729"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02932",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02932",
|
||
"Impact": "Critical",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02933",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02933",
|
||
"Impact": "High",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02934",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02934",
|
||
"Impact": "High",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02935",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02935",
|
||
"Impact": "High",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02947",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02947",
|
||
"Impact": "Critical",
|
||
"Public": "20190619"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03329",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03329",
|
||
"Impact": "Critical",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03411",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03411",
|
||
"Impact": "Critical",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03412",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-212, CWE-256, CWE-522",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03412",
|
||
"Impact": "Low",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03413",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03413",
|
||
"Impact": "High",
|
||
"Public": "20180921"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03414",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03414",
|
||
"Impact": "High",
|
||
"Public": "20181002"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03415",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03415",
|
||
"Impact": "Critical",
|
||
"Public": "20181002"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03461",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03461",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03462",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03462",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03463",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03463",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03464",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120, CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03464",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03465",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03465",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03466",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352, CWE-829",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03466",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03467",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-552",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03467",
|
||
"Impact": "Low",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03468",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03468",
|
||
"Impact": "Low",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03469",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03469",
|
||
"Impact": "Low",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03471",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03471",
|
||
"Impact": "Low",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03558",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03558",
|
||
"Impact": "Critical",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03559",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03559",
|
||
"Impact": "Critical",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03561",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20, CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03561",
|
||
"Impact": "Low",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03614",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03614",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03615",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03615",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03616",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03616",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04024",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04024",
|
||
"Impact": "Critical",
|
||
"Public": "20180726"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04250",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-601",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04250",
|
||
"Impact": "Low",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04291",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04291",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04295",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04295",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04296",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04296",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04297",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04297",
|
||
"Impact": "High",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04298",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04298",
|
||
"Impact": "High",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04299",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04299",
|
||
"Impact": "Low",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04300",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04300",
|
||
"Impact": "High",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04301",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||
"CWE": "CWE-20, CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04301",
|
||
"Impact": "Low",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04302",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04302",
|
||
"Impact": "Low",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04303",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04303",
|
||
"Impact": "High",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04304",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04304",
|
||
"Impact": "Low",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04305",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290, CWE-356",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04305",
|
||
"Impact": "Low",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04569",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04569",
|
||
"Impact": "Critical",
|
||
"Public": "20181023"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04581",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04581",
|
||
"Impact": "Critical",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04582",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04582",
|
||
"Impact": "Critical",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04635",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04635",
|
||
"Impact": "Critical",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04637",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04637",
|
||
"Impact": "Low",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04638",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04638",
|
||
"Impact": "Low",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04639",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04639",
|
||
"Impact": "Critical",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04640",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04640",
|
||
"Impact": "Critical",
|
||
"Public": "20190521"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04642",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04642",
|
||
"Impact": "High",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00585",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00585",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00586",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00586",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00587",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00587",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00588",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00588",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00589",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00589",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00590",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00590",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00591",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00591",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00592",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00592",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00593",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00593",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00594",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00594",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00595",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00595",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00596",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00596",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00597",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-295",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00597",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00598",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00598",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00599",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00599",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00600",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00600",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00601",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00601",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00602",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00602",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00603",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00603",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00604",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00604",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00605",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00605",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00606",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00606",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00607",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00607",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00608",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00608",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00609",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00609",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00610",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00610",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00723",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00723",
|
||
"Impact": "Low",
|
||
"Public": "20190709"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00746",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00746",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00747",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00747",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00771",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00771",
|
||
"Impact": "Low",
|
||
"Public": "20190522"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00782",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00782",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00783",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00783",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00784",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-275",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00784",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-12358",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12358",
|
||
"Impact": "Low",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12359",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12359",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12360",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12360",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12361",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12361",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12362",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12362",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12363",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12363",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12364",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12364",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12365",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12365",
|
||
"Impact": "Low",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12366",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12366",
|
||
"Impact": "Low",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12367",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12367",
|
||
"Impact": "Low",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12369",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12369",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12370",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12370",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12371",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12371",
|
||
"Impact": "High",
|
||
"Public": "20200709"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12375",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12375",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12376",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12376",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12377",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12377",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12378",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12378",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12379",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12379",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12383",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-522",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12383",
|
||
"Impact": "Low",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12385",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12385",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12386",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12386",
|
||
"Impact": "High",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12387",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12387",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12388",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12388",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12390",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12390",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12392",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12392",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12393",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12393",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12395",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12395",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12396",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12396",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12397",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12397",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12398",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12398",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12399",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12399",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12401",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12401",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12402",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12402",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12403",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12403",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12405",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12405",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12406",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12406",
|
||
"Impact": "High",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12407",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12407",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18492",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18492",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18493",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18493",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18494",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18494",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18495",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18495",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18497",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18497",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18498",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18498",
|
||
"Impact": "Critical",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18499",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18499",
|
||
"Impact": "Low",
|
||
"Public": "20190228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18500",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18500",
|
||
"Impact": "Critical",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18501",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18501",
|
||
"Impact": "Critical",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18502",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18502",
|
||
"Impact": "Critical",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18503",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18503",
|
||
"Impact": "High",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18504",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18504",
|
||
"Impact": "Critical",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18505",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18505",
|
||
"Impact": "Critical",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18506",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18506",
|
||
"Impact": "Low",
|
||
"Public": "20190205"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18510",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18510",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5156",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5156",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5186",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5186",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5187",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5187",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5188",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5188",
|
||
"Impact": "Critical",
|
||
"Public": "20181018"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11691",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11691",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11692",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11692",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11695",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11695",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11696",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11696",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11697",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11697",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11698",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11698",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11699",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11699",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11701",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11701",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11708",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11708",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11709",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11709",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11710",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11710",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11711",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11711",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11712",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11712",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11713",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11713",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11714",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11714",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11715",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11715",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11716",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11716",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11717",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-116",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11717",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11718",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11718",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11719",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11719",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11720",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11720",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11721",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11721",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11723",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11723",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11724",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11724",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11725",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11725",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11727",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-295",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11727",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11728",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11728",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11729",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11729",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11730",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11730",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11733",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11733",
|
||
"Impact": "Critical",
|
||
"Public": "20190927"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9788",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9788",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9789",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9789",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9790",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9790",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9791",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9791",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9792",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9792",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9793",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9793",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9795",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9795",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9796",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9796",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9797",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9797",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9799",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9799",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9800",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9800",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9802",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9802",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9803",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9803",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9805",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9805",
|
||
"Impact": "Critical",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9806",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9806",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9807",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9807",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9808",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9808",
|
||
"Impact": "Low",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9809",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9809",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9810",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9810",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9811",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9811",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9813",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9813",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9814",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9814",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9816",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9816",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9817",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9817",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9819",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9819",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9820",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9820",
|
||
"Impact": "Critical",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9821",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9821",
|
||
"Impact": "High",
|
||
"Public": "20190723"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192486001",
|
||
"Comment": "firefox-esr is earlier than 0:68.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192486002",
|
||
"Comment": "firefox-esr-wayland is earlier than 0:68.0.2-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |