7694 lines
428 KiB
JSON
7694 lines
428 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20231814",
|
||
"Version": "oval:org.altlinux.errata:def:20231814",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2023-1814: package `kernel-image-rt` update to version 6.1.28-alt1.rt10",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2023-1814",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1814",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-05795",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-05795",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01213",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01213",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01218",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01218",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01266",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01266",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01611",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01611",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01649",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01649",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01650",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01650",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01666",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01666",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01824",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01824",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01828",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01828",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01863",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01863",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01864",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01864",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01865",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01865",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01874",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01874",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01875",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01875",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01887",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01887",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01888",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01888",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01955",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01955",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01985",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01985",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02100",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02100",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02101",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02101",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02102",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02102",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02103",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02103",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02104",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02104",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02346",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02346",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02938",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02938",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03220",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03220",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03232",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03232",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03233",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03233",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03237",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03237",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03902",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03902",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03942",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03942",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04027",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04027",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04152",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04152",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04244",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04244",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04561",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04561",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04710",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04710",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04711",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04711",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04712",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04712",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04741",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04741",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04802",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04802",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04803",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04803",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04804",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04804",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04806",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04806",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04826",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04826",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04828",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04828",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04829",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04829",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04831",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04831",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04837",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04837",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04838",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04838",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04839",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04839",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04840",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04840",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04841",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04841",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04844",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04844",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04845",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04845",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04846",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04846",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04848",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04848",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04849",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04849",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04850",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04850",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04851",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04851",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04852",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04852",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04853",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04853",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04855",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04855",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04856",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04856",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04859",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04859",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04864",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04864",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04867",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04867",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05198",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05198",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05472",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05472",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05473",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05473",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06349",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06349",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06351",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06351",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00026",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00026",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00094",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00094",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00095",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00095",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00102",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00102",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00513",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00513",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00595",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00595",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00613",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00613",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00622",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00622",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00789",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00789",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00790",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00790",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00822",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00822",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00823",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00823",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00833",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00833",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00888",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00888",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00889",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00889",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00891",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00891",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00899",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00899",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01121",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01121",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01249",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01249",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01499",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01499",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01512",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01512",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01567",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01567",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01630",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01630",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01644",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01644",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01725",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01725",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02325",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02325",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02361",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02361",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02362",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02362",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02387",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02387",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02442",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02442",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02443",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02443",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02672",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02672",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02677",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02677",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02681",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02681",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02682",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02682",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02696",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02696",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02703",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02703",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02816",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02816",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02817",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02817",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02885",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02885",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02886",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02886",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02999",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02999",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03142",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03142",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03143",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03143",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03402",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03402",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03403",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03403",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03404",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03404",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03409",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03409",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03703",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03703",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03903",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03903",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03904",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03904",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03921",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03921",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03928",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03928",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03970",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03970",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03984",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03984",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04052",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04052",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04090",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04090",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04266",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04266",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04271",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04271",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04393",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04393",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04725",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04725",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04878",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04878",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05010",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05010",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05184",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05184",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05378",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05378",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05402",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05402",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05411",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05411",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05414",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05414",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05481",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05481",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05539",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05539",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05648",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05648",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05654",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05654",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05655",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05655",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05657",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05657",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05658",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05658",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05664",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05664",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05684",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05684",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05692",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05692",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05717",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05717",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05723",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05723",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05770",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05770",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05780",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05780",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05842",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05842",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05844",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05844",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05887",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05887",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05888",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05888",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05890",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05890",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05997",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05997",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06017",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06017",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06024",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06024",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06029",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06029",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06054",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06054",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06169",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06169",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06170",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06170",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06228",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06228",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06397",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06397",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06398",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06398",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06399",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06399",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06459",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06459",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06903",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06903",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06912",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06912",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07314",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07314",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07326",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07326",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07327",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07327",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07329",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07329",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07330",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07330",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07331",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07331",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07332",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07332",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07333",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07333",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07334",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07334",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07335",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07335",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07337",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07337",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07339",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07339",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07343",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07343",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07345",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07345",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07347",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07347",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07348",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07348",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07350",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07350",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07351",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07351",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07354",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07354",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07355",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07355",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07356",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07356",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07357",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07357",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07507",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07507",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00153",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00153",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00158",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00158",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00358",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00358",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00360",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00360",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00362",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00362",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00378",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00378",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00379",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00379",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00380",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00380",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00457",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00457",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00626",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00626",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00627",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00627",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00644",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00644",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00645",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00645",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00646",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00646",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00647",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00647",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00670",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00670",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00747",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00747",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01129",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01129",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01191",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01191",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01192",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01192",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01194",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01194",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01197",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01197",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01198",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01198",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01199",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01199",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01207",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01207",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01208",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01208",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01209",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01209",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01210",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01210",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01211",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01211",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01212",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01212",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01213",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01213",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01216",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01216",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01217",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01217",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01274",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01274",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01275",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01275",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01283",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01283",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01285",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01285",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01292",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01292",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01298",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01298",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01299",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01299",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01301",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01301",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01492",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01492",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01745",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01745",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01771",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01771",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01957",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01957",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02164",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02164",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02304",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02304",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02348",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02348",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02363",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02363",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02397",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02397",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02408",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02408",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02450",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02450",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02515",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02515",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02525",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02525",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02527",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02527",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02533",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02533",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02604",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02604",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02624",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02624",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02628",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02628",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02634",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02634",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02738",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02738",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03163",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03163",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03171",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03171",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-16120",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-16120",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-25639",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25639",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-26558",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26558",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-27170",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-27171",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27171",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35499",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35499",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35501",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35508",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20320",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20320",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20321",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20321",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-23133",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-23134",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-23134",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-27363",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-27363",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-27364",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-27365",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28691",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28691",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28714",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28714",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28715",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28715",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28950",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28951",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28951",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28952",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28952",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28964",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28964",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28971",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28972",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28972",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29155",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29264",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29264",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29265",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29265",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29646",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29647",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29647",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29648",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29648",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29649",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29649",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29650",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30178",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30178",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-31829",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-31916",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-32078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-32399",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-33033",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-33034",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-33624",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33624",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-33655",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-34556",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-34556",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-34693",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-34693",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3483",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3483",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3501",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3501",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3506",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3506",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-35477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-35477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3573",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3609",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3640",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3655",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3655",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3659",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3679",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-37159",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3732",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3736",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3736",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3739",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3739",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3752",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3753",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3753",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3764",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3772",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3773",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38160",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38160",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38166",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38166",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38200",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38200",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38201",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38201",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38203",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38203",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38205",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38206",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38206",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38207",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38207",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38208",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38208",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38209",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38209",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3847",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3923",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4023",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4023",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4032",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4032",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4037",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-40490",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-40490",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4083",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4090",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4135",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4148",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4148",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4149",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4149",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4150",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4150",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4155",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-41864",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4203",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-42252",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42252",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-42327",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42327",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-42739",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43389",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43975",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43975",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-44733",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-44879",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45402",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45469",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45469",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45486",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45868",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45868",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-46283",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46283",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0168",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0171",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0264",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0330",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0382",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0433",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0487",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0487",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0494",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0500",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0516",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0617",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0850",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0854",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1015",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1016",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1048",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1055",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1205",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1263",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1353",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1508",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1508",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1651",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1671",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1734",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1786",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1786",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1852",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1973",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1973",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2153",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-23222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2380",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24958",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24959",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2503",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25258",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25265",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25375",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26490",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26878",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26966",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27223",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27666",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27950",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28356",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28388",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28389",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2873",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28796",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2905",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2905",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29582",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2961",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2961",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2991",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2991",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29968",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3077",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3104",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3105",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3106",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3107",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3108",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3110",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3113",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3114",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3115",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-32296",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-32981",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3303",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3303",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3344",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33981",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34494",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34495",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3521",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3521",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3543",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3544",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3544",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3586",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3586",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3594",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3595",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36123",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36123",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36280",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36879",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3707",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38457",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39188",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39189",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39190",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39842",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39842",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40133",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40307",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40307",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40768",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40768",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41218",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4127",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4127",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41848",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41849",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41850",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-42328",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42328",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-42329",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42329",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-42703",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-42721",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-42722",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4379",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4379",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-43945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-44032",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-44033",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-44034",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45869",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45884",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45885",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45886",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45887",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45888",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45919",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4662",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-47520",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-47929",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-48423",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0458",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0468",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0469",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0590",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1249",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1382",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1838",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1838",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2006",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2007",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2007",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2008",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2019",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2019",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2166",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2177",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22995",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22996",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22997",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22998",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22999",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23000",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23003",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23004",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23004",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23006",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23006",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23454",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23455",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23559",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-25012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2513",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26242",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26545",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28327",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28327",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3159",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32269",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-rt to version 6.1.28-alt1.rt10. \nSecurity Fix(es):\n\n * BDU:2020-05795: Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-01213: Уязвимость файла drivers/scsi/scsi_transport_iscsi.c ядра операционной системы Linux, позволяющая нарушителю подключаться к сокету iscsi NETLINK и отправлять команды ядру\n\n * BDU:2021-01218: Уязвимость функции show_transport_handle ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-01266: Уязвимость функции show_transport_handle ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2021-01611: Уязвимость драйвера GPU Nouveau ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01649: Уязвимость реализации функции show_transport_handle() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01650: Уязвимость подсистемы iSCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2021-01666: Уязвимость подсистемы iSCSI ядра операционных систем Linux, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных\n\n * BDU:2021-01824: Уязвимость драйвера Freescale Gianfar Ethernet ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01828: Уязвимость реализации функции usbip_sockfd_store ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01863: Уязвимость файла fs/io_uring.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01864: Уязвимость файла sound/soc/qcom/sdm845.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01865: Уязвимость файла kernel/bpf/verifier.c ядра операционной системы Linux, позволяющая нарушителю получить получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01874: Уязвимость файла kernel/bpf/verifier.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01875: Уязвимость файла fs/fuse/fuse_i.h ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01887: Уязвимость файла get_old_root in fs/btrfs/ctree.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01888: Уязвимость файла drivers/pci/hotplug/rpadlpar_sysfs.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-01955: Уязвимость функции synic_get (arch/x86/kvm/hyperv.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01985: Уязвимость реализации функции video_usercopy (drivers/media/v4l2-core/v4l2-ioctl.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02100: Уязвимость подсистемы netfilter ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02101: Уязвимость функции rtr_recvmsg ядра операционной системы Linux, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2021-02102: Уязвимость подсистемы BPF функции map_create или check_btf_info ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2021-02103: Уязвимость драйвера пользовательского режима (UMD) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02104: Уязвимость функции tipc_nl_retrieve_key ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02346: Уязвимость компонента kernel/bpf/verifier.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-02938: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-03220: Уязвимость подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-03232: Уязвимость подсистемы еBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-03233: Уязвимость реализации протокола CAN BCM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-03237: Уязвимость компонента arch/arm/mach-footbridge/personal-pci.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2021-03902: Уязвимость функции sco_sock_sendmsg() подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы или повысить свои привилегии\n\n * BDU:2021-03942: Уязвимость ядра операционных систем Linux, связанная с недостатками проверки входных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-04027: Уязвимость функции hso_free_net_device драйвера /net/usb/hso.c ядра операционной системы Linux, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность\n\n * BDU:2021-04152: Уязвимость компонента net/nfc/llcp_sock.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04244: Уязвимость компонента drivers/net/ethernet/xilinx/ll_temac_main.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04561: Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04710: Уязвимость функции strlen компонента fs/nfsd/trace.h ядра операционной системы Linux, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04711: Уязвимость функции xdr_set_page_base компонента net/sunrpc/xdr.c ядра операционной системы Linux, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04712: Уязвимость компонента arch/powerpc/perf/core-book3s.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04741: Уязвимость ядра операционной системы Linux , связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04802: Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04803: Уязвимость подсистемы Bluetooth ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы\n\n * BDU:2021-04804: Уязвимость функции vt_k_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-04806: Уязвимость функции ccp_run_aes_gcm_cmd() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04826: Уязвимость компонента net/can/bcm.c ядра операционной системы Linux, позволяющая нарушителю прочитать часть памяти ядра\n\n * BDU:2021-04828: Уязвимость функции cipso_v4_genopt (net/ipv4/cipso_ipv4.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04829: Уязвимость ядра операционной системы Linux , связанная с записью за границами буфера в памяти, позволяющая нарушителю прочитать часть памяти ядра\n\n * BDU:2021-04831: Уязвимость функции intel_pmu_drain_pebs_nhm (arch/x86/events/intel/ds.c) ядра операционной системы Linux , связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04837: Уязвимость параметров NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, и NF_SYSCTL_CT_BUCKETS компонента net/netfilter/nf_conntrack_standalone.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-04838: Уязвимость компонента net/bluetooth/hci_request.c операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04839: Уязвимость структуры hci_chan компонента net/bluetooth/hci_event.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04840: Уязвимость ядра операционной системы Linux , связанная с раскрытием информации через несоответствие, позволяющая нарушителю прочитать часть памяти ядра\n\n * BDU:2021-04841: Уязвимость драйвера Nosy драйвера ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-04844: Уязвимость модуля f2fs ядра операционной системы Linux, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04845: Уязвимость ядра операционной системы Linux , связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2021-04846: Уязвимость функции hci_sock_bound_ioctl () подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код в контексте ядра\n\n * BDU:2021-04848: Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека\n\n * BDU:2021-04849: Уязвимость компонента kernel/bpf/hashtab.c ядра операционной системы Linux , связанная с записью за границами буфера в памяти, позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность данных\n\n * BDU:2021-04850: Уязвимость ядра операционной системы Linux , связанная с недостаточной проверкой присвоения разрешений для критичного ресурса, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04851: Уязвимость компонента drivers/usb/host/max3421-hcd.c ядра операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04852: Уязвимость компонента drivers/net/ethernet/xilinx/xilinx_emaclite.c ядра операционной системы Linux, позволяющая нарушителю взломать механизм защиты ASLR\n\n * BDU:2021-04853: Уязвимость функции ext4_write_inline_data_end (fs/ext4/inline.c) ядра операционной системы Linux, позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность данных\n\n * BDU:2021-04855: Уязвимость компонента net/sctp/socket.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-04856: Уязвимость сокетов nfc операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-04859: Уязвимость синтаксического анализатора radiotap подсистемы mac80211 ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04864: Уязвимость реализации btrfs операционной системы Linux связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04867: Уязвимость KVM API операционной системы Linux, позволяющая нарушителю вызвать повреждение стека\n\n * BDU:2021-05198: Уязвимость спецификации Bluetooth Core Specification ядра операционной системы Linux, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2021-05472: Уязвимость функции mbochs_ioctl файла samples / vfio-mdev / mbochs.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2021-05473: Уязвимость функции detach_capi_ctr драйвера /isdn/capi/kcapi.c ядра операционных систем семейства Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06349: Уязвимость функции mwifiex_usb_recv (drivers/net/wireless/marvell/mwifiex/usb.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.\n\n * BDU:2021-06351: Уязвимость функции hw_atl_utils_fw_rpc_wait (drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00026: Уязвимость реализации системного вызова TEE_IOC_OPEN_SESSION или TEE_IOC_INVOKE ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-00094: Уязвимость функции pep_sock_accept (net/phonet/pep.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00095: Уязвимость реализации функций close() и fget() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-00102: Уязвимость функции __rds_conn_create() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00513: Уязвимость функции nf_tables_newset (net/netfilter/nf_tables_api.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00595: Уязвимость реализации протокола IPv6 ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00613: Уязвимость реализации протокола IPv4 ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00622: Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-00789: Уязвимость функции rtsx_usb_ms_drv_remove компонента memstick ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность информации\n\n * BDU:2022-00790: Уязвимость реализации функции nfs_atomic_open() ядра операционных систем Linux, позволяющая нарушителю оказать влияние на конфиденциальность данных\n\n * BDU:2022-00822: Уязвимость функции check_alu_op() (kernel/bpf/verifier.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00823: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00833: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00888: Уязвимость драйвера drivers/usb/gadget/composite.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00889: Уязвимость подсистемы UDF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00891: Уязвимость драйвера drivers/usb/gadget/function/rndis.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00899: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01121: Уязвимость функции __f2fs_setxattr ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01249: Уязвимость параметра len в файле drivers/net/usb/sr9700.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2022-01499: Уязвимость реализации функции st21nfca_connectivity_event_received() ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2022-01512: Уязвимость компонента fs/quota/quota_tree.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01567: Уязвимость модулей esp4 и esp6 ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01629: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01630: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01644: Уязвимость реализации функции tc_new_tfilter() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01725: Уязвимость функции add_partition ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02325: Уязвимость функции gc_data_segment (fs/f2fs/gc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02328: Уязвимость функции jbd2_journal_wait_updates ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02361: Уязвимость функции smb2_ioctl_query_info() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02362: Уязвимость функции BPF_BTF_LOAD() подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-02387: Уязвимость компонента drivers/hid/hid-elo.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02442: Уязвимость функции block_invalidatepage() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02443: Уязвимость подсистемы прямого доступа к памяти DMA (Direct memory access) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02672: Уязвимость функции ems_usb_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02677: Уязвимость функции в drivers/bluetooth/virtio_bt.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02681: Уязвимость функции mcba_usb_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02682: Уязвимость ядра драйвера FireDTV ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы и оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2022-02696: Уязвимость функции copy_page_to_iter() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-02703: Уязвимость драйвера USB-устройства Xilinx (drivers/usb/gadget/udc/udc-xilinx.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02816: Уязвимость функции pfkey_register ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2022-02817: Уязвимость функции io_rw_init_file ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02885: Уязвимость драйверов drivers/net/hamradio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02886: Уязвимость файла fs/io_uring.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-02999: Уязвимость функции map_get_next_key операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03142: Уязвимость реализации протокола ICMP ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-03143: Уязвимость функции prealloc_elems_and_freelist (kernel/bpf/stackmap.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2022-03400: Уязвимость функции scsi_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03402: Уязвимость функции sock_getsockopt() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03403: Уязвимость реализации io-workqueue ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03404: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03409: Уязвимость компонента net/llc/af_llc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03703: Уязвимость интерфейса асинхронного ввода/вывода io_uring ядра операционной системы Linux, позволяющая нарушителю аварийно завершить работу или повысить свои привилегии\n\n * BDU:2022-03903: Уязвимость реализации функций preparse_server_key(), free_preparse_server_key() и destroy_server_key() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03904: Уязвимость реализации функции acrn_dev_ioctl() модуля службы гипервизора ACRN (HSM) ядра операционных систем Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-03921: Уязвимость ядра операционной системы Linux, связанная с недостаточной энтропией, позволяющая нарушителю идентифицировать клиентов\n\n * BDU:2022-03928: Уязвимость функции btrfs_alloc_tree_b (fs/btrfs/extent-tree.c) файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03970: Уязвимость функции rpmsg_probe (drivers/rpmsg/virtio_rpmsg_bus.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03984: Уязвимость функции rpmsg_virtio_add_ctrl_dev (drivers/rpmsg/virtio_rpmsg_bus.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04052: Уязвимость компонента drivers/block/floppy.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04090: Уязвимость функции nft_set_desc_concat_parse() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-04266: Уязвимость функции nci_request (net/nfc/nci/core.c) интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-04271: Уязвимость кроссплатформенного гипервизора Xen ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04393: Уязвимость функции smtcfb_read() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2022-04444: Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04725: Уязвимость функции clear_bss ядра операционных систем Linux, связанная с ошибками при очистке начального символа блока (.bss), позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04878: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05010: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05184: Уязвимость функции kvm_dirty_ring_push (virt/kvm/dirty_ring.c) подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05378: Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05402: Уязвимость функции nfcmrvl_nci_unregister_dev() операционной системы Linux , позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05411: Уязвимость функции usb_8dev_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05414: Уязвимость компонентов arch/x86/kvm/lapic.c, kvm_free_lapic подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05417: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к устройству\n\n * BDU:2022-05481: Уязвимость функции kvm_irq_delivery_to_apic_fast() подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05539: Уязвимость функции pxa3xx_gcu_write ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05648: Уязвимость функции sctp_make_strreset_req (net/sctp/sm_make_chunk.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05654: Уязвимость компонента drivers/firmware/efi/capsule-loader.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05655: Уязвимость драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_kms.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05657: Уязвимость функции vmw_cmd_res_check драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_execbuf.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05658: Уязвимость функции vmw_execbuf_tie_context драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_execbuf.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05664: Уязвимость функции xfrm_expand_policies (net/xfrm/xfrm_policy.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05684: Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05692: Уязвимость функции shmget() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-05717: Уязвимость звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05723: Уязвимость файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05770: Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-05780: Уязвимость функции btrfs_rm_device компонента fs/btrfs/volumes.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2022-05842: Уязвимость функции aspeed_lpc_ctrl_mmap компонента drivers/soc/aspeed/aspeed-lpc-ctrl.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05844: Уязвимость функции diFree (fs/jfs/inode.c) журналируемой файловой системы (JFS) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-05887: Уязвимость верификатора ebpf компонента bpf_map_update_elem и bpf_map_freeze (kernel/bpf/syscall.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2022-05888: Уязвимость компонента bpf_jit_insn (arch/s390/net/bpf_jit_comp.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-05890: Уязвимость драйвера GPU i915 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05997: Уязвимость компонента fs/io_uring.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06017: Уязвимость реализации функции take_rmap_locks() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06024: Уязвимость функции ismt_access() драйвера i2c-ismt ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06029: Уязвимость функций dvb_demux_open() и dvb_dmxdev_release() драйвера модуля dvb-core ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06054: Уязвимость функции stex_queuecommand_lck() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06169: Уязвимость функции unmap_mapping_range (include/asm-generic/tlb.h) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06170: Уязвимость функции SNDCTL_DSP_SYNC ioctl звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06228: Уязвимость функции roccat_report_event (drivers/hid/hid-roccat.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06397: Уязвимость драйвера drivers/net/hamradio/6pack.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06398: Уязвимость функции ax25_release() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06399: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06400: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06459: Уязвимость функций unix_sock_destructor() и unix_release_sock() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06903: Уязвимость компонента net/rose/rose_timer.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06912: Уязвимость ядра операционной системы Linux, связанная с ошибками при освобождении ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07314: Уязвимость драйвера xen-netback ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07326: Уязвимость функции _rtw_init_xmit_priv в модуле drivers/staging/r8188eu/core/rtw_xmit.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07327: Уязвимость функции free_charger_irq() в модуле drivers/power/supply/wm8350_power.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07328: Уязвимость функции ef100_update_stats в модуле drivers/net/hyperv/netvsc_drv.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07329: Уязвимость функции kfd_parse_subtype_iolink в модуле drivers/gpu/drm/amd/amdkfd/kfd_crat.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07330: Уязвимость функции ef100_update_stats в модуле drivers/net/ethernet/sfc/ef100_nic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07331: Уязвимость функции amvdec_set_canvases() в модуле drivers/staging/media/meson/vdec/vdec_helpers.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07332: Уязвимость функции lkdtm_ARRAY_BOUNDS модуля drivers/misc/lkdtm/bugs.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2022-07333: Уязвимость функции uapi_finalize() в модуле drivers/infiniband/core/uverbs_uapi.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07334: Уязвимость функции imx_register_uart_clocks() в модуле drivers/clk/imx/clk.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07335: Уязвимость функции malidp_crtc_reset() в модуле drivers/gpu/drm/arm/malidp_crtc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07337: Уязвимость функции mtk_vcodec_fw_vpu_init() в модуле drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07339: Уязвимость драйвера файловой системы NFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07343: Уязвимость функции intr_callback() (drivers/net/usb/r8152.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07345: Уязвимость функции постановки в очередь sch_sfb ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07347: Уязвимость компонента drivers/char/pcmcia/scr24x_cs.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07348: Уязвимость функции kcm_tx_work() (net/kcm/kcmsock.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07350: Уязвимость функционала подсчета ссылок в режиме BSS (Basic Service Set) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07351: Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07354: Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07355: Уязвимость функции bpf_tail_call() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к данным\n\n * BDU:2022-07356: Уязвимость драйвера drivers/char/pcmcia/synclink_cs.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07357: Уязвимость драйвера drivers/video/fbdev/smscufx.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07507: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить уровень привилегий\n\n * BDU:2023-00153: Уязвимость функции kfree_skb() драйвера xen-netback ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00158: Уязвимость подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00358: Уязвимость функции qdisc_graft (net/sched/sch_api.c) подсистемы управления трафиком ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.\n\n * BDU:2023-00360: Уязвимость сетевой файловой системы Network File System (NFS) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00362: Уязвимость функции filelock_init механизма блокировок (fs/locks.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00378: Уязвимость функции atm_tc_enqueue() подсистемы приоритизации отправки сетевых пакетов (net/sched/sch_atm.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00379: Уязвимость функции cbq_classify() подсистемы приоритизации отправки сетевых пакетов (net/sched/sch_cbq.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00380: Уязвимость драйвера drivers/net/wireless/rndis_wlan.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00457: Уязвимость файла fs/io_uring.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00626: Уязвимость функции qdisc_graft (net/sched/sch_api.c) подсистемы управления трафиком ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00627: Уязвимость функции io_install_fixed_file() модуля io_uring/filetable.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00644: Уязвимость драйвера DVB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00645: Уязвимость драйвера DVB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00646: Уязвимость драйвера DVB (drivers/media/dvb-core/dvb_frontend.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2023-00647: Уязвимость драйвера DVB (drivers/media/dvb-core/dvbdev.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00670: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00747: Уязвимость драйвера drivers/hid/hid-bigbenff.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01129: Уязвимость механизма MPLS (Multiprotocol Label Switching) ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-01191: Уязвимость драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01192: Уязвимость функции drm_gem_shmem_get_sg_table (drivers/gpu/drm/virtio/virtgpu_object.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01194: Уязвимость подсистемы беспроводной связи в модуле net/mac802154/llsec.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01197: Уязвимость подсистемы io_uring в модуле fs/io_uring.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2023-01198: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в AMD Secure Encrypted Virtualization (SEV) в модуле virt/kvm/kvm_main.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01199: Уязвимость подсистемы USB модуля drivers/usb/core/hub.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01207: Уязвимость функции nf_tables_updtable (nf_tables_api.c) межсетевого экрана ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01208: Уязвимость функции qmp_get() (drivers/soc/qcom/qcom_aoss.c) драйвера Qualcomm AOSS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01209: Уязвимость функций module_gzip_decompress() и module_xz_decompress() в модуле kernel/module/decompress.c подсистемы загрузки модулей ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01210: Уязвимость функции dwc3_qcom_probe() (drivers/usb/dwc3/dwc3-qcom.c) драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01211: Уязвимость функции tegra_xusb_find_port_node() (drivers/phy/tegra/xusb.c) драйвера NVIDIA Tegra XUSB Pad ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01212: Уязвимость функции ufs_mtk_init_va09_pwr_ctrl() (drivers/scsi/ufs/ufs-mediatek.c) драйвера UFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01213: Уязвимость функции malidp_check_pages_threshold() (drivers/gpu/drm/arm/malidp_planes.c) драйвера Mali-DP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01216: Уязвимость функции dr_domain_init_resources() в модуле drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01217: Уязвимость драйвера drivers/bluetooth/hci_qca.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01274: Уязвимость функции cifs_put_tcp_session() (fs/cifs/connect.c) подсистемы SMB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01275: Уязвимость функции fill_files_note() (fs/binfmt_elf.c) подсистемы поддержки файловых систем ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01283: Уязвимость компонента net/unix/diag.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01285: Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01292: Уязвимость функции afu_mmio_region_get_by_offset (drivers/fpga/dfl-afu-region.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01298: Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01299: Уязвимость подсистемы KVM AMD для поддержки вложенной виртуализации SVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01301: Уязвимость подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, выполнить произвольный код\n\n * BDU:2023-01492: Уязвимость функции expr__ctx_new() (tools/perf/util/expr.c) утилиты perf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2023-01745: Уязвимость функции mi_enum_attr() в модуле fs/ntfs3/record.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01771: Уязвимость функции ib_copy_ah_attr_to_user() менеджера соединений RDMA ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-01957: Уязвимость функции vhost_net_set_backend (drivers/vhost/net.c) подкомпонента virtio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и раскрыть защищаемую информацию\n\n * BDU:2023-02164: Уязвимость функции io_file_get_fixed() модуля io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02304: Уязвимость подсистемы LightNVM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2023-02348: Уязвимость драйвера netdevsim ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02363: Уязвимость функции verity_ctr() в модуле drivers/md/dm-verity-target.c подсистемы device-mapper ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код и подключить уязвимое оборудование\n\n * BDU:2023-02397: Уязвимость функции udmabuf_vm_fault() в модуле drivers/dma-buf/udmabuf.c ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2023-02408: Уязвимость функции virt_to_bus()/bus_to_virt() драйвера dpt_i2o ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02450: Уязвимость реализации протокола SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании (закрыть соединение)\n\n * BDU:2023-02515: Уязвимость функции do_prlimit() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-02525: Уязвимость реализации протокола sctp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02527: Уязвимость функции can_rcv_filter() в модуле net/can/af_can.c ядра операционной системы Linux в функции can_rcv_filter(), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02533: Уязвимость функции inode_init_owner() в модуле fs/inode.c файловой системы XFS ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и получить доступ к защищаемой информации, а так же вызвать отказ в обслуживании\n\n * BDU:2023-02604: Уязвимость функции rxrpc_unbundle_conn() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02624: Уязвимость реализации сетевого протокола NET/ROM ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-02628: Уязвимость функции ext4_xattr_set_entry() в модуле fs/ext4/xattr.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-02634: Уязвимость функции x86_emulate_insn компонента arch/x86/kvm/emulate.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02738: Уязвимость функции kvm_steal_time_set_preempted() в модуле arch/x86/kvm/x86.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2023-03163: Уязвимость функции prepare_to_relocate() в модуле fs/btrfs/relocation.c файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03171: Уязвимость драйвере протокола IEEE 1394 (FireWire) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-16120: Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.\n\n * CVE-2020-25639: A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.\n\n * CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.\n\n * CVE-2020-27170: An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.\n\n * CVE-2020-27171: An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.\n\n * CVE-2020-35499: A NULL pointer dereference flaw in Linux kernel versions prior to 5.11 may be seen if sco_sock_getsockopt function in net/bluetooth/sco.c do not have a sanity check for a socket connection, when using BT_SNDMTU/BT_RCVMTU for SCO sockets. This could allow a local attacker with a special user privilege to crash the system (DOS) or leak kernel internal information.\n\n * CVE-2020-35501: A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem\n\n * CVE-2020-35508: A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.\n\n * CVE-2021-20320: A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.\n\n * CVE-2021-20321: A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.\n\n * CVE-2021-20322: A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.\n\n * CVE-2021-23133: A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.\n\n * CVE-2021-23134: Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.\n\n * CVE-2021-27363: An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.\n\n * CVE-2021-27364: An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.\n\n * CVE-2021-27365: An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.\n\n * CVE-2021-28691: Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. Such kernel thread termination will lead to a use-after-free in Linux netback when the backend is destroyed, as the kernel thread associated with queue 0 will have already exited and thus the call to kthread_stop will be performed against a stale pointer.\n\n * CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)\n\n * CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)\n\n * CVE-2021-28950: An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.\n\n * CVE-2021-28951: An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start, aka CID-3ebba796fa25.\n\n * CVE-2021-28952: An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)\n\n * CVE-2021-28964: A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.\n\n * CVE-2021-28971: In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.\n\n * CVE-2021-28972: In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\\0' termination, aka CID-cc7a0bb058b8.\n\n * CVE-2021-29155: An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.\n\n * CVE-2021-29264: An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.\n\n * CVE-2021-29265: An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.\n\n * CVE-2021-29646: An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, aka CID-0217ed2848e8.\n\n * CVE-2021-29647: An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.\n\n * CVE-2021-29648: An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245.\n\n * CVE-2021-29649: An issue was discovered in the Linux kernel before 5.11.11. The user mode driver (UMD) has a copy_process() memory leak, related to a lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c, aka CID-f60a85cad677.\n\n * CVE-2021-29650: An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.\n\n * CVE-2021-30002: An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.\n\n * CVE-2021-30178: An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.\n\n * CVE-2021-31829: kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.\n\n * CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-32078: An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.\n\n * CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.\n\n * CVE-2021-33033: The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.\n\n * CVE-2021-33034: In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.\n\n * CVE-2021-33624: In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.\n\n * CVE-2021-33655: When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.\n\n * CVE-2021-34556: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.\n\n * CVE-2021-34693: net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.\n\n * CVE-2021-3483: A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected\n\n * CVE-2021-3501: A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.\n\n * CVE-2021-3506: An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-35477: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.\n\n * CVE-2021-3573: A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.\n\n * CVE-2021-3609: .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n\n * CVE-2021-3640: A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.\n\n * CVE-2021-3655: A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.\n\n * CVE-2021-3659: A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.\n\n * CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.\n\n * CVE-2021-3732: A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.\n\n * CVE-2021-3736: A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.\n\n * CVE-2021-3739: A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3744: A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.\n\n * CVE-2021-3752: A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2021-3753: A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.\n\n * CVE-2021-3764: A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3772: A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.\n\n * CVE-2021-3773: A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.\n\n * CVE-2021-38160: In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior\n\n * CVE-2021-38166: In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.\n\n * CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.\n\n * CVE-2021-38199: fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering, which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection.\n\n * CVE-2021-38200: arch/powerpc/perf/core-book3s.c in the Linux kernel before 5.12.13, on systems with perf_event_paranoid=-1 and no specific PMU driver support registered, allows local users to cause a denial of service (perf_instruction_pointer NULL pointer dereference and OOPS) via a \"perf record\" command.\n\n * CVE-2021-38201: net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n\n * CVE-2021-38202: fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.\n\n * CVE-2021-38203: btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.\n\n * CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.\n\n * CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).\n\n * CVE-2021-38206: The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.\n\n * CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.\n\n * CVE-2021-38208: net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.\n\n * CVE-2021-38209: net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, and NF_SYSCTL_CT_BUCKETS sysctls.\n\n * CVE-2021-3847: An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.\n\n * CVE-2021-3923: A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.\n\n * CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.\n\n * CVE-2021-4002: A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4023: A flaw was found in the io-workqueue implementation in the Linux kernel versions prior to 5.15-rc1. The kernel can panic when an improper cancellation operation triggers the submission of new io-uring operations during a shortage of free space. This flaw allows a local user with permissions to execute io-uring requests to possibly crash the system.\n\n * CVE-2021-4032: A vulnerability was found in the Linux kernel's KVM subsystem in arch/x86/kvm/lapic.c kvm_free_lapic when a failure allocation was detected. In this flaw the KVM subsystem may crash the kernel due to mishandling of memory errors that happens during VCPU construction, which allows an attacker with special user privilege to cause a denial of service. This flaw affects kernel versions prior to 5.15 rc7.\n\n * CVE-2021-4037: A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.\n\n * CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.\n\n * CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.\n\n * CVE-2021-4090: An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.\n\n * CVE-2021-4095: A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2021-4135: A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4148: A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.\n\n * CVE-2021-4149: A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.\n\n * CVE-2021-4150: A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.\n\n * CVE-2021-4155: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.\n\n * CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.\n\n * CVE-2021-4202: A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.\n\n * CVE-2021-4203: A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.\n\n * CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.\n\n * CVE-2021-42327: dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.\n\n * CVE-2021-42739: The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.\n\n * CVE-2021-43389: An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.\n\n * CVE-2021-43975: In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.\n\n * CVE-2021-43976: In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).\n\n * CVE-2021-44733: A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.\n\n * CVE-2021-44879: In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.\n\n * CVE-2021-45095: pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.\n\n * CVE-2021-45402: The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"\n\n * CVE-2021-45469: In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry.\n\n * CVE-2021-45480: An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances.\n\n * CVE-2021-45485: In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.\n\n * CVE-2021-45486: In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.\n\n * CVE-2021-45868: In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.\n\n * CVE-2021-46283: nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel before 5.12.13 allows local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a netfilter table expression in their own namespace.\n\n * CVE-2022-0168: A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.\n\n * CVE-2022-0171: A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).\n\n * CVE-2022-0264: A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6\n\n * CVE-2022-0322: A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).\n\n * CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-0382: An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0433: A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0480: A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.\n\n * CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.\n\n * CVE-2022-0494: A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.\n\n * CVE-2022-0500: A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.\n\n * CVE-2022-0516: A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.\n\n * CVE-2022-0617: A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.\n\n * CVE-2022-0850: A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.\n\n * CVE-2022-0854: A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.\n\n * CVE-2022-1011: A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.\n\n * CVE-2022-1012: A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.\n\n * CVE-2022-1015: A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.\n\n * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.\n\n * CVE-2022-1048: A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-1055: A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5\n\n * CVE-2022-1195: A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.\n\n * CVE-2022-1198: A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.\n\n * CVE-2022-1199: A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.\n\n * CVE-2022-1204: A use-after-free flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1205: A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1263: A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.\n\n * CVE-2022-1353: A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.\n\n * CVE-2022-1508: An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.\n\n * CVE-2022-1651: A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.\n\n * CVE-2022-1671: A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-1734: A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.\n\n * CVE-2022-1786: A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.\n\n * CVE-2022-1852: A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.\n\n * CVE-2022-1973: A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.\n\n * CVE-2022-2078: A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.\n\n * CVE-2022-2153: A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.\n\n * CVE-2022-2318: There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.\n\n * CVE-2022-23222: kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.\n\n * CVE-2022-2380: The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.\n\n * CVE-2022-24448: An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.\n\n * CVE-2022-24958: drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.\n\n * CVE-2022-24959: An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.\n\n * CVE-2022-2503: Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5\n\n * CVE-2022-25258: An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.\n\n * CVE-2022-25265: In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.\n\n * CVE-2022-25375: An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.\n\n * CVE-2022-26490: st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.\n\n * CVE-2022-26878: drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).\n\n * CVE-2022-26966: An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.\n\n * CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.\n\n * CVE-2022-27666: A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.\n\n * CVE-2022-27950: In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.\n\n * CVE-2022-28356: In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.\n\n * CVE-2022-28388: usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28389: mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28390: ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.\n\n * CVE-2022-28796: jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.\n\n * CVE-2022-2905: An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.\n\n * CVE-2022-29582: In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.\n\n * CVE-2022-2961: A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-2991: A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.\n\n * CVE-2022-29968: An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.\n\n * CVE-2022-3077: A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.\n\n * CVE-2022-3078: An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.\n\n * CVE-2022-3104: An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3105: An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().\n\n * CVE-2022-3106: An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().\n\n * CVE-2022-3107: An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.\n\n * CVE-2022-3108: An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().\n\n * CVE-2022-3110: An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.\n\n * CVE-2022-3111: An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().\n\n * CVE-2022-3112: An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3113: An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3114: An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3115: An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3202: A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.\n\n * CVE-2022-32296: The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.\n\n * CVE-2022-32981: An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.\n\n * CVE-2022-3303: A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition\n\n * CVE-2022-3344: A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).\n\n * CVE-2022-33743: network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.\n\n * CVE-2022-33744: Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.\n\n * CVE-2022-33981: drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.\n\n * CVE-2022-34494: rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.\n\n * CVE-2022-34495: rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.\n\n * CVE-2022-3521: A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.\n\n * CVE-2022-3543: A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.\n\n * CVE-2022-3544: A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044.\n\n * CVE-2022-3586: A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.\n\n * CVE-2022-3594: A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.\n\n * CVE-2022-3595: A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.\n\n * CVE-2022-36123: The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.\n\n * CVE-2022-36280: An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-36879: An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.\n\n * CVE-2022-3707: A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.\n\n * CVE-2022-38457: A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-39188: An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.\n\n * CVE-2022-39189: An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.\n\n * CVE-2022-39190: An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.\n\n * CVE-2022-39842: An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.\n\n * CVE-2022-40133: A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-40307: An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.\n\n * CVE-2022-40476: A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2022-40768: drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.\n\n * CVE-2022-41218: In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.\n\n * CVE-2022-41222: mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.\n\n * CVE-2022-4127: A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service.\n\n * CVE-2022-41848: drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.\n\n * CVE-2022-41849: drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.\n\n * CVE-2022-41850: roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.\n\n * CVE-2022-42328: Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).\n\n * CVE-2022-42329: Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).\n\n * CVE-2022-42703: mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.\n\n * CVE-2022-42721: A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.\n\n * CVE-2022-42722: In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.\n\n * CVE-2022-4379: A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial\n\n * CVE-2022-43945: The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\n\n * CVE-2022-44032: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().\n\n * CVE-2022-44033: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().\n\n * CVE-2022-44034: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().\n\n * CVE-2022-45869: A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.\n\n * CVE-2022-45884: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.\n\n * CVE-2022-45885: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.\n\n * CVE-2022-45886: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.\n\n * CVE-2022-45887: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.\n\n * CVE-2022-45888: An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.\n\n * CVE-2022-45919: An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.\n\n * CVE-2022-4662: A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.\n\n * CVE-2022-4696: There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current-\u003ensproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current-\u003ensproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above\n\n\n * CVE-2022-47520: An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.\n\n * CVE-2022-47929: In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.\n\n * CVE-2022-48423: In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.\n\n * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11\n\n * CVE-2023-0468: A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.\n\n * CVE-2023-0469: A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.\n\n * CVE-2023-0590: A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.\n\n * CVE-2023-1095: In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.\n\n * CVE-2023-1195: A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.\n\n * CVE-2023-1249: A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.\n\n * CVE-2023-1382: A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.\n\n * CVE-2023-1838: A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.\n\n * CVE-2023-1872: A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx-\u003euring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n\n\n * CVE-2023-2006: A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2007: The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2008: A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2019: A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.\n\n * CVE-2023-2166: A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2023-2177: A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2023-22995: In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.\n\n * CVE-2023-22996: In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.\n\n * CVE-2023-22997: In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-22998: In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-22999: In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23000: In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.\n\n * CVE-2023-23001: In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23002: In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23003: In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.\n\n * CVE-2023-23004: In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23006: In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23454: cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).\n\n * CVE-2023-23455: atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).\n\n * CVE-2023-23559: In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.\n\n * CVE-2023-25012: The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.\n\n * CVE-2023-2513: A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.\n\n * CVE-2023-26242: afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow.\n\n * CVE-2023-26545: In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.\n\n * CVE-2023-28327: A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.\n\n * CVE-2023-3111: A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().\n\n * CVE-2023-3159: A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.\n\n * CVE-2023-32269: An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2023-05-17"
|
||
},
|
||
"Updated": {
|
||
"Date": "2023-05-17"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2020-05795",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-266, CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-05795",
|
||
"Impact": "Low",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01213",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CWE": "CWE-125, CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01213",
|
||
"Impact": "Low",
|
||
"Public": "20210307"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01218",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-122, CWE-250, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01218",
|
||
"Impact": "High",
|
||
"Public": "20210307"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01266",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01266",
|
||
"Impact": "High",
|
||
"Public": "20210307"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01611",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01611",
|
||
"Impact": "Low",
|
||
"Public": "20210129"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01649",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-200, CWE-465",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01649",
|
||
"Impact": "Low",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01650",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01650",
|
||
"Impact": "High",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01666",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122, CWE-250, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01666",
|
||
"Impact": "High",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01824",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20, CWE-682",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01824",
|
||
"Impact": "Low",
|
||
"Public": "20210305"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01828",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01828",
|
||
"Impact": "Low",
|
||
"Public": "20210310"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01863",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01863",
|
||
"Impact": "Low",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01864",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01864",
|
||
"Impact": "High",
|
||
"Public": "20210310"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01865",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01865",
|
||
"Impact": "Low",
|
||
"Public": "20210317"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01874",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-193",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01874",
|
||
"Impact": "Low",
|
||
"Public": "20210317"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01875",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-834",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01875",
|
||
"Impact": "Low",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01887",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01887",
|
||
"Impact": "Low",
|
||
"Public": "20210316"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01888",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01888",
|
||
"Impact": "High",
|
||
"Public": "20210317"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01955",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01955",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01985",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401, CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01985",
|
||
"Impact": "Low",
|
||
"Public": "20210112"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02100",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-662, CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02100",
|
||
"Impact": "Low",
|
||
"Public": "20210315"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02101",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-665, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02101",
|
||
"Impact": "Low",
|
||
"Public": "20210314"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02102",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-307",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02102",
|
||
"Impact": "Low",
|
||
"Public": "20210308"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02103",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02103",
|
||
"Impact": "Low",
|
||
"Public": "20210319"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02104",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02104",
|
||
"Impact": "Low",
|
||
"Public": "20210315"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02346",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02346",
|
||
"Impact": "Low",
|
||
"Public": "20210417"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02938",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-362, CWE-367, CWE-665",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02938",
|
||
"Impact": "Low",
|
||
"Public": "20201108"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03220",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-863",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03220",
|
||
"Impact": "Low",
|
||
"Public": "20210503"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03232",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03232",
|
||
"Impact": "High",
|
||
"Public": "20210623"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03233",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03233",
|
||
"Impact": "High",
|
||
"Public": "20210619"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03237",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03237",
|
||
"Impact": "High",
|
||
"Public": "20210505"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03902",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03902",
|
||
"Impact": "High",
|
||
"Public": "20210722"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03942",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03942",
|
||
"Impact": "Low",
|
||
"Public": "20210628"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04027",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04027",
|
||
"Impact": "Low",
|
||
"Public": "20210715"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04152",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04152",
|
||
"Impact": "Low",
|
||
"Public": "20210531"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04244",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04244",
|
||
"Impact": "High",
|
||
"Public": "20210618"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04561",
|
||
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04561",
|
||
"Impact": "Low",
|
||
"Public": "20210613"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04710",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04710",
|
||
"Impact": "High",
|
||
"Public": "20210706"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04711",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04711",
|
||
"Impact": "High",
|
||
"Public": "20210613"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04712",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04712",
|
||
"Impact": "Low",
|
||
"Public": "20210618"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04741",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400, CWE-835",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04741",
|
||
"Impact": "Low",
|
||
"Public": "20210722"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04802",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04802",
|
||
"Impact": "Low",
|
||
"Public": "20210924"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04803",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04803",
|
||
"Impact": "Low",
|
||
"Public": "20210914"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04804",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125, CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04804",
|
||
"Impact": "Low",
|
||
"Public": "20210830"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04806",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04806",
|
||
"Impact": "Low",
|
||
"Public": "20210924"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04826",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04826",
|
||
"Impact": "Low",
|
||
"Public": "20210613"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04828",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04828",
|
||
"Impact": "High",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04829",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04829",
|
||
"Impact": "Low",
|
||
"Public": "20210326"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04831",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400, CWE-755",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04831",
|
||
"Impact": "Low",
|
||
"Public": "20210316"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04837",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04837",
|
||
"Impact": "Low",
|
||
"Public": "20210412"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04838",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04838",
|
||
"Impact": "High",
|
||
"Public": "20210423"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04839",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04839",
|
||
"Impact": "High",
|
||
"Public": "20210322"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04840",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04840",
|
||
"Impact": "Low",
|
||
"Public": "20210729"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04841",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04841",
|
||
"Impact": "High",
|
||
"Public": "20210404"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04844",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04844",
|
||
"Impact": "High",
|
||
"Public": "20210325"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04845",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04845",
|
||
"Impact": "Low",
|
||
"Public": "20210729"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04846",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04846",
|
||
"Impact": "Low",
|
||
"Public": "20210531"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04848",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04848",
|
||
"Impact": "High",
|
||
"Public": "20210703"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04849",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04849",
|
||
"Impact": "High",
|
||
"Public": "20210806"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04850",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04850",
|
||
"Impact": "Low",
|
||
"Public": "20210608"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04851",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04851",
|
||
"Impact": "Low",
|
||
"Public": "20210721"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04852",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-824",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04852",
|
||
"Impact": "Low",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04853",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04853",
|
||
"Impact": "High",
|
||
"Public": "20210830"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04855",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04855",
|
||
"Impact": "High",
|
||
"Public": "20210413"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04856",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04856",
|
||
"Impact": "High",
|
||
"Public": "20210504"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04859",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04859",
|
||
"Impact": "Low",
|
||
"Public": "20210531"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04864",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04864",
|
||
"Impact": "Low",
|
||
"Public": "20210707"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04867",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04867",
|
||
"Impact": "High",
|
||
"Public": "20210413"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05198",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05198",
|
||
"Impact": "Low",
|
||
"Public": "20210608"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05472",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05472",
|
||
"Impact": "Low",
|
||
"Public": "20210811"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05473",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05473",
|
||
"Impact": "Low",
|
||
"Public": "20210924"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06349",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06349",
|
||
"Impact": "Low",
|
||
"Public": "20211031"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06351",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06351",
|
||
"Impact": "High",
|
||
"Public": "20211113"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00026",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00026",
|
||
"Impact": "High",
|
||
"Public": "20211216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00094",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00094",
|
||
"Impact": "Low",
|
||
"Public": "20211210"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00095",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00095",
|
||
"Impact": "High",
|
||
"Public": "20211201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00102",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00102",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00513",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00513",
|
||
"Impact": "Low",
|
||
"Public": "20210604"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00595",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00595",
|
||
"Impact": "High",
|
||
"Public": "20210531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00613",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-327, CWE-330",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00613",
|
||
"Impact": "Low",
|
||
"Public": "20210324"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00622",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00622",
|
||
"Impact": "High",
|
||
"Public": "20211218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00789",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00789",
|
||
"Impact": "High",
|
||
"Public": "20210511"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00790",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-755, CWE-908, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00790",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00822",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00822",
|
||
"Impact": "Low",
|
||
"Public": "20211216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00823",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00823",
|
||
"Impact": "High",
|
||
"Public": "20220103"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00833",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00833",
|
||
"Impact": "Low",
|
||
"Public": "20220125"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00888",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00888",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00889",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00889",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00891",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-668, CWE-1284",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00891",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00899",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-913",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00899",
|
||
"Impact": "High",
|
||
"Public": "20210519"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01121",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01121",
|
||
"Impact": "High",
|
||
"Public": "20211222"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01249",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01249",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01499",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01499",
|
||
"Impact": "High",
|
||
"Public": "20220112"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01512",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01512",
|
||
"Impact": "Critical",
|
||
"Public": "20211008"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01567",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01567",
|
||
"Impact": "High",
|
||
"Public": "20220307"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01629",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-129, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01629",
|
||
"Impact": "Low",
|
||
"Public": "20220317"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01630",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416, CWE-824",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01630",
|
||
"Impact": "Low",
|
||
"Public": "20220317"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01644",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01644",
|
||
"Impact": "High",
|
||
"Public": "20220201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01725",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01725",
|
||
"Impact": "Low",
|
||
"Public": "20210907"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02325",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02325",
|
||
"Impact": "Low",
|
||
"Public": "20211210"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02328",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02328",
|
||
"Impact": "High",
|
||
"Public": "20220226"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02361",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02361",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02362",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02362",
|
||
"Impact": "High",
|
||
"Public": "20211218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02387",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02387",
|
||
"Impact": "Low",
|
||
"Public": "20220124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02442",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-354",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02442",
|
||
"Impact": "Low",
|
||
"Public": "20211028"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02443",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02443",
|
||
"Impact": "Low",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02672",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02672",
|
||
"Impact": "High",
|
||
"Public": "20220331"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02677",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401, CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02677",
|
||
"Impact": "Low",
|
||
"Public": "20211020"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02681",
|
||
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02681",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02682",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02682",
|
||
"Impact": "Low",
|
||
"Public": "20211020"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02696",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02696",
|
||
"Impact": "High",
|
||
"Public": "20210617"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02703",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02703",
|
||
"Impact": "High",
|
||
"Public": "20220224"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02816",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02816",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02817",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-665, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02817",
|
||
"Impact": "Low",
|
||
"Public": "20220428"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02885",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02885",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02886",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-367, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02886",
|
||
"Impact": "High",
|
||
"Public": "20220408"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02999",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02999",
|
||
"Impact": "Low",
|
||
"Public": "20211229"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03142",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-330",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03142",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03143",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03143",
|
||
"Impact": "High",
|
||
"Public": "20210930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03400",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03400",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03402",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03402",
|
||
"Impact": "Low",
|
||
"Public": "20210927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03403",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03403",
|
||
"Impact": "Low",
|
||
"Public": "20211124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03404",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03404",
|
||
"Impact": "Low",
|
||
"Public": "20220107"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03409",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03409",
|
||
"Impact": "Low",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03703",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03703",
|
||
"Impact": "High",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03903",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03903",
|
||
"Impact": "High",
|
||
"Public": "20220331"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03904",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03904",
|
||
"Impact": "Low",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03921",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203, CWE-330, CWE-331",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03921",
|
||
"Impact": "Low",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03928",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03928",
|
||
"Impact": "Low",
|
||
"Public": "20211018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03970",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03970",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03984",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03984",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04052",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04052",
|
||
"Impact": "Low",
|
||
"Public": "20220426"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04090",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04090",
|
||
"Impact": "Critical",
|
||
"Public": "20220630"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04266",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04266",
|
||
"Impact": "High",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04271",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04271",
|
||
"Impact": "High",
|
||
"Public": "20220701"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04393",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04393",
|
||
"Impact": "Low",
|
||
"Public": "20220713"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04444",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-404, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04444",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04725",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04725",
|
||
"Impact": "High",
|
||
"Public": "20220701"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04878",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04878",
|
||
"Impact": "High",
|
||
"Public": "20220718"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05010",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-755",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05010",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05184",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05184",
|
||
"Impact": "Low",
|
||
"Public": "20220406"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05378",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-404, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05378",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05402",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05402",
|
||
"Impact": "High",
|
||
"Public": "20220501"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05411",
|
||
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05411",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05414",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-459",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05414",
|
||
"Impact": "Low",
|
||
"Public": "20210908"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05417",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05417",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05481",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05481",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05539",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05539",
|
||
"Impact": "Critical",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05648",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-681, CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05648",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05654",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05654",
|
||
"Impact": "High",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05655",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-120, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05655",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05657",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05657",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05658",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05658",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05664",
|
||
"CVSS": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05664",
|
||
"Impact": "Low",
|
||
"Public": "20220602"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05684",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05684",
|
||
"Impact": "Low",
|
||
"Public": "20210924"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05692",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05692",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05717",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05717",
|
||
"Impact": "High",
|
||
"Public": "20220322"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05723",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05723",
|
||
"Impact": "High",
|
||
"Public": "20220307"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05770",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05770",
|
||
"Impact": "Low",
|
||
"Public": "20210818"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05780",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05780",
|
||
"Impact": "High",
|
||
"Public": "20210823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05842",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05842",
|
||
"Impact": "High",
|
||
"Public": "20210817"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05844",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05844",
|
||
"Impact": "High",
|
||
"Public": "20220322"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05887",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:N/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05887",
|
||
"Impact": "Low",
|
||
"Public": "20211109"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05888",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05888",
|
||
"Impact": "Low",
|
||
"Public": "20210902"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05890",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05890",
|
||
"Impact": "High",
|
||
"Public": "20220125"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05997",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05997",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06017",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06017",
|
||
"Impact": "Low",
|
||
"Public": "20210708"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06024",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-131",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06024",
|
||
"Impact": "Low",
|
||
"Public": "20220729"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06029",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06029",
|
||
"Impact": "Low",
|
||
"Public": "20220908"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06054",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-665, CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06054",
|
||
"Impact": "Low",
|
||
"Public": "20220908"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06169",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06169",
|
||
"Impact": "Low",
|
||
"Public": "20220721"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06170",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-476, CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06170",
|
||
"Impact": "Low",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06228",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06228",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06397",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06397",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06398",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06398",
|
||
"Impact": "High",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06399",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06399",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06400",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06400",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06459",
|
||
"CVSS": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-401, CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06459",
|
||
"Impact": "Low",
|
||
"Public": "20220929"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06903",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06903",
|
||
"Impact": "Low",
|
||
"Public": "20220703"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06912",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06912",
|
||
"Impact": "Low",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07314",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07314",
|
||
"Impact": "Low",
|
||
"Public": "20221205"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07326",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07326",
|
||
"Impact": "Low",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07327",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07327",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07328",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07328",
|
||
"Impact": "Low",
|
||
"Public": "20220314"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07329",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07329",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07330",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07330",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07331",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07331",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07332",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07332",
|
||
"Impact": "Low",
|
||
"Public": "20220120"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07333",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07333",
|
||
"Impact": "Low",
|
||
"Public": "20211231"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07334",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07334",
|
||
"Impact": "Low",
|
||
"Public": "20220412"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07335",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07335",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07337",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07337",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07339",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07339",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07343",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404, CWE-779",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07343",
|
||
"Impact": "High",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07345",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07345",
|
||
"Impact": "Low",
|
||
"Public": "20221019"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07347",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07347",
|
||
"Impact": "Low",
|
||
"Public": "20221029"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07348",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07348",
|
||
"Impact": "High",
|
||
"Public": "20221016"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07350",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07350",
|
||
"Impact": "Low",
|
||
"Public": "20221013"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07351",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07351",
|
||
"Impact": "Low",
|
||
"Public": "20221013"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07354",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07354",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07355",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07355",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07356",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07356",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07357",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07357",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07507",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07507",
|
||
"Impact": "High",
|
||
"Public": "20221124"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00153",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00153",
|
||
"Impact": "Low",
|
||
"Public": "20221205"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00158",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00158",
|
||
"Impact": "High",
|
||
"Public": "20210221"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00358",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00358",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00360",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-131, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00360",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00362",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00362",
|
||
"Impact": "Low",
|
||
"Public": "20210903"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00378",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-136, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00378",
|
||
"Impact": "Low",
|
||
"Public": "20230101"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00379",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-136, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00379",
|
||
"Impact": "Low",
|
||
"Public": "20230101"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00380",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190, CWE-680",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00380",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00457",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00457",
|
||
"Impact": "Low",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00626",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00626",
|
||
"Impact": "Low",
|
||
"Public": "20221019"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00627",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00627",
|
||
"Impact": "Low",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00644",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00644",
|
||
"Impact": "High",
|
||
"Public": "20221115"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00645",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00645",
|
||
"Impact": "High",
|
||
"Public": "20221124"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00646",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00646",
|
||
"Impact": "High",
|
||
"Public": "20221115"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00647",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00647",
|
||
"Impact": "High",
|
||
"Public": "20221115"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00670",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00670",
|
||
"Impact": "Low",
|
||
"Public": "20221123"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00747",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00747",
|
||
"Impact": "Low",
|
||
"Public": "20230131"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01129",
|
||
"CVSS": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01129",
|
||
"Impact": "Critical",
|
||
"Public": "20230213"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01191",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01191",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01192",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-436",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01192",
|
||
"Impact": "Low",
|
||
"Public": "20220719"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01194",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01194",
|
||
"Impact": "Low",
|
||
"Public": "20210407"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01197",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01197",
|
||
"Impact": "Low",
|
||
"Public": "20210903"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01198",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-459",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01198",
|
||
"Impact": "Low",
|
||
"Public": "20220421"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01199",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-455",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01199",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01207",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01207",
|
||
"Impact": "Low",
|
||
"Public": "20220809"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01208",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-772, CWE-911",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01208",
|
||
"Impact": "Low",
|
||
"Public": "20220131"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01209",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01209",
|
||
"Impact": "Low",
|
||
"Public": "20221111"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01210",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01210",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01211",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01211",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01212",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01212",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01213",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01213",
|
||
"Impact": "Low",
|
||
"Public": "20220428"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01216",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01216",
|
||
"Impact": "Low",
|
||
"Public": "20211222"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01217",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01217",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01274",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-457",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01274",
|
||
"Impact": "Low",
|
||
"Public": "20221027"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01275",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01275",
|
||
"Impact": "Low",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01283",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01283",
|
||
"Impact": "Low",
|
||
"Public": "20221201"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01285",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01285",
|
||
"Impact": "Low",
|
||
"Public": "20221121"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01292",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01292",
|
||
"Impact": "High",
|
||
"Public": "20230219"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01298",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01298",
|
||
"Impact": "High",
|
||
"Public": "20230303"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01299",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-440",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01299",
|
||
"Impact": "Low",
|
||
"Public": "20221024"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01301",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01301",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01492",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-252, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01492",
|
||
"Impact": "High",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01745",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-590, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01745",
|
||
"Impact": "High",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01771",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01771",
|
||
"Impact": "Low",
|
||
"Public": "20211103"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01957",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01957",
|
||
"Impact": "High",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02164",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02164",
|
||
"Impact": "High",
|
||
"Public": "20220407"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02304",
|
||
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02304",
|
||
"Impact": "Low",
|
||
"Public": "20210814"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02348",
|
||
"CVSS": "AV:L/AC:H/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-59, CWE-911",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02348",
|
||
"Impact": "Low",
|
||
"Public": "20220729"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02363",
|
||
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-287, CWE-302",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02363",
|
||
"Impact": "Low",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02397",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-125, CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02397",
|
||
"Impact": "High",
|
||
"Public": "20230414"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02408",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-367, CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02408",
|
||
"Impact": "High",
|
||
"Public": "20220401"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02450",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-354",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02450",
|
||
"Impact": "Low",
|
||
"Public": "20220302"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02515",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-264, CWE-385, CWE-476, CWE-514",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02515",
|
||
"Impact": "Low",
|
||
"Public": "20230121"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02525",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02525",
|
||
"Impact": "Low",
|
||
"Public": "20220727"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02527",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02527",
|
||
"Impact": "Low",
|
||
"Public": "20221207"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02533",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02533",
|
||
"Impact": "High",
|
||
"Public": "20210122"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02604",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02604",
|
||
"Impact": "High",
|
||
"Public": "20220114"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02624",
|
||
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02624",
|
||
"Impact": "Low",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02628",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02628",
|
||
"Impact": "Low",
|
||
"Public": "20220802"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02634",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02634",
|
||
"Impact": "Low",
|
||
"Public": "20220525"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02738",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-662",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02738",
|
||
"Impact": "Low",
|
||
"Public": "20220608"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03163",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03163",
|
||
"Impact": "High",
|
||
"Public": "20220817"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03171",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03171",
|
||
"Impact": "High",
|
||
"Public": "20220425"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-16120",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-16120",
|
||
"Impact": "Low",
|
||
"Public": "20210210"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-25639",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25639",
|
||
"Impact": "Low",
|
||
"Public": "20210304"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-26558",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26558",
|
||
"Impact": "Low",
|
||
"Public": "20210524"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-27170",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
|
||
"Impact": "Low",
|
||
"Public": "20210320"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-27171",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-193",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27171",
|
||
"Impact": "Low",
|
||
"Public": "20210320"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35499",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35499",
|
||
"Impact": "Low",
|
||
"Public": "20210219"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35501",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
|
||
"Impact": "Low",
|
||
"Public": "20220330"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35508",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
|
||
"Impact": "Low",
|
||
"Public": "20210326"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20320",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20320",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20321",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20321",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20322",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-330",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-23133",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
|
||
"Impact": "High",
|
||
"Public": "20210422"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-23134",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-23134",
|
||
"Impact": "Low",
|
||
"Public": "20210512"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-27363",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-27363",
|
||
"Impact": "Low",
|
||
"Public": "20210307"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-27364",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364",
|
||
"Impact": "High",
|
||
"Public": "20210307"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-27365",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365",
|
||
"Impact": "High",
|
||
"Public": "20210307"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28691",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28691",
|
||
"Impact": "High",
|
||
"Public": "20210629"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28714",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28714",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28715",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28715",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28950",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-834",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
|
||
"Impact": "Low",
|
||
"Public": "20210320"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28951",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28951",
|
||
"Impact": "Low",
|
||
"Public": "20210320"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28952",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28952",
|
||
"Impact": "High",
|
||
"Public": "20210320"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28964",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28964",
|
||
"Impact": "Low",
|
||
"Public": "20210322"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28971",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
|
||
"Impact": "Low",
|
||
"Public": "20210322"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28972",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28972",
|
||
"Impact": "Low",
|
||
"Public": "20210322"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29155",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
|
||
"Impact": "Low",
|
||
"Public": "20210420"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29264",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29264",
|
||
"Impact": "Low",
|
||
"Public": "20210326"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29265",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29265",
|
||
"Impact": "Low",
|
||
"Public": "20210326"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29646",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
|
||
"Impact": "Low",
|
||
"Public": "20210330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29647",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29647",
|
||
"Impact": "Low",
|
||
"Public": "20210330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29648",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-307",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29648",
|
||
"Impact": "Low",
|
||
"Public": "20210330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29649",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29649",
|
||
"Impact": "Low",
|
||
"Public": "20210330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-29650",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
|
||
"Impact": "Low",
|
||
"Public": "20210330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30002",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30002",
|
||
"Impact": "Low",
|
||
"Public": "20210402"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30178",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30178",
|
||
"Impact": "Low",
|
||
"Public": "20210407"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-31829",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
|
||
"Impact": "Low",
|
||
"Public": "20210506"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-31916",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
|
||
"Impact": "Low",
|
||
"Public": "20210506"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-32078",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32078",
|
||
"Impact": "High",
|
||
"Public": "20210617"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-32399",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
|
||
"Impact": "High",
|
||
"Public": "20210510"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-33033",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
|
||
"Impact": "High",
|
||
"Public": "20210514"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-33034",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
|
||
"Impact": "High",
|
||
"Public": "20210514"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-33624",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33624",
|
||
"Impact": "Low",
|
||
"Public": "20210623"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-33655",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
|
||
"Impact": "Low",
|
||
"Public": "20220718"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-34556",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-34556",
|
||
"Impact": "Low",
|
||
"Public": "20210802"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-34693",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-34693",
|
||
"Impact": "Low",
|
||
"Public": "20210614"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3483",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3483",
|
||
"Impact": "High",
|
||
"Public": "20210517"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3501",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3501",
|
||
"Impact": "High",
|
||
"Public": "20210506"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3506",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3506",
|
||
"Impact": "High",
|
||
"Public": "20210419"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-35477",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-35477",
|
||
"Impact": "Low",
|
||
"Public": "20210802"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3573",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
|
||
"Impact": "Low",
|
||
"Public": "20210813"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3609",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
|
||
"Impact": "High",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3640",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640",
|
||
"Impact": "High",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3655",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3655",
|
||
"Impact": "Low",
|
||
"Public": "20210805"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3659",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
|
||
"Impact": "Low",
|
||
"Public": "20220822"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3679",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
|
||
"Impact": "Low",
|
||
"Public": "20210805"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-37159",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
|
||
"Impact": "Low",
|
||
"Public": "20210721"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3732",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3736",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3736",
|
||
"Impact": "Low",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3739",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3739",
|
||
"Impact": "High",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3744",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
|
||
"Impact": "Low",
|
||
"Public": "20220304"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3752",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3753",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3753",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3764",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
|
||
"Impact": "Low",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3772",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-354",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
|
||
"Impact": "Low",
|
||
"Public": "20220302"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3773",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
|
||
"Impact": "Critical",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38160",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38160",
|
||
"Impact": "High",
|
||
"Public": "20210807"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38166",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38166",
|
||
"Impact": "High",
|
||
"Public": "20210807"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38198",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38198",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38199",
|
||
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38199",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38200",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38200",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38201",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38201",
|
||
"Impact": "High",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38202",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38202",
|
||
"Impact": "High",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38203",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38203",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38204",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38204",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38205",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-824",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38206",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38206",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38207",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38207",
|
||
"Impact": "High",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38208",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38208",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38209",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38209",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3847",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
|
||
"Impact": "High",
|
||
"Public": "20220401"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3923",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
|
||
"Impact": "Low",
|
||
"Public": "20230327"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4001",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4001",
|
||
"Impact": "Low",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4002",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4023",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4023",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4032",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-459",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4032",
|
||
"Impact": "Low",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4037",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
|
||
"Impact": "High",
|
||
"Public": "20220824"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-40490",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-40490",
|
||
"Impact": "High",
|
||
"Public": "20210903"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4083",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
|
||
"Impact": "High",
|
||
"Public": "20220118"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4090",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4095",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4135",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
|
||
"Impact": "Low",
|
||
"Public": "20220714"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4148",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-354",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4148",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4149",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4149",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4150",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4150",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4155",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-131",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
|
||
"Impact": "Low",
|
||
"Public": "20220824"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-41864",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
|
||
"Impact": "High",
|
||
"Public": "20211002"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4202",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4203",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-42252",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42252",
|
||
"Impact": "High",
|
||
"Public": "20211011"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-42327",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42327",
|
||
"Impact": "Low",
|
||
"Public": "20211021"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-42739",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
|
||
"Impact": "Low",
|
||
"Public": "20211020"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43389",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
|
||
"Impact": "Low",
|
||
"Public": "20211104"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43975",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43975",
|
||
"Impact": "Low",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43976",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
|
||
"Impact": "Low",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-44733",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
|
||
"Impact": "High",
|
||
"Public": "20211222"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-44879",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
|
||
"Impact": "Low",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45095",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45095",
|
||
"Impact": "Low",
|
||
"Public": "20211216"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45402",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45469",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45469",
|
||
"Impact": "High",
|
||
"Public": "20211223"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45480",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45480",
|
||
"Impact": "Low",
|
||
"Public": "20211224"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45485",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
|
||
"Impact": "High",
|
||
"Public": "20211225"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45486",
|
||
"CVSS": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
|
||
"Impact": "Low",
|
||
"Public": "20211225"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45868",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45868",
|
||
"Impact": "Low",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-46283",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46283",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0168",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
|
||
"Impact": "Low",
|
||
"Public": "20220826"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0171",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-212",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171",
|
||
"Impact": "Low",
|
||
"Public": "20220826"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0264",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0322",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0330",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0382",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0433",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0480",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0480",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0487",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0487",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0494",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0500",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0516",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
|
||
"Impact": "High",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0617",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0850",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
|
||
"Impact": "High",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0854",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1011",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
|
||
"Impact": "High",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1012",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
|
||
"Impact": "High",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1015",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
|
||
"Impact": "Low",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1016",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1048",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
|
||
"Impact": "High",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1055",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
|
||
"Impact": "High",
|
||
"Public": "20220329"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1195",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
|
||
"Impact": "Low",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1198",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1199",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199",
|
||
"Impact": "High",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1204",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1205",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1263",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1353",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
|
||
"Impact": "High",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1508",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1508",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1651",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651",
|
||
"Impact": "High",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1671",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671",
|
||
"Impact": "High",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1734",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734",
|
||
"Impact": "High",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1786",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1786",
|
||
"Impact": "High",
|
||
"Public": "20220602"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1852",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
|
||
"Impact": "Low",
|
||
"Public": "20220630"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1973",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1973",
|
||
"Impact": "High",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2078",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-121",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078",
|
||
"Impact": "Low",
|
||
"Public": "20220630"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2153",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2318",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2318",
|
||
"Impact": "Low",
|
||
"Public": "20220706"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-23222",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222",
|
||
"Impact": "High",
|
||
"Public": "20220114"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2380",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380",
|
||
"Impact": "Low",
|
||
"Public": "20220713"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24448",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24958",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-763",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
|
||
"Impact": "High",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24959",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2503",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503",
|
||
"Impact": "Low",
|
||
"Public": "20220812"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25258",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25265",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-913",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25375",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-1284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
|
||
"Impact": "Low",
|
||
"Public": "20220220"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26490",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
|
||
"Impact": "High",
|
||
"Public": "20220306"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26878",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
|
||
"Impact": "Low",
|
||
"Public": "20220311"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26966",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
|
||
"Impact": "Low",
|
||
"Public": "20220312"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27223",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
|
||
"Impact": "High",
|
||
"Public": "20220316"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27666",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
|
||
"Impact": "High",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27950",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
|
||
"Impact": "Low",
|
||
"Public": "20220328"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28356",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
|
||
"Impact": "Low",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28388",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28389",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28390",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
|
||
"Impact": "High",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2873",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-131",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
|
||
"Impact": "Low",
|
||
"Public": "20220822"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28796",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
|
||
"Impact": "High",
|
||
"Public": "20220408"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2905",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2905",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29582",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582",
|
||
"Impact": "High",
|
||
"Public": "20220422"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2961",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2961",
|
||
"Impact": "High",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2991",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2991",
|
||
"Impact": "Low",
|
||
"Public": "20220825"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29968",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
|
||
"Impact": "High",
|
||
"Public": "20220502"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3077",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3078",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078",
|
||
"Impact": "Low",
|
||
"Public": "20220901"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3104",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3105",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3106",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3107",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3108",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3110",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3111",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3112",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3113",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3114",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3115",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3202",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-32296",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-330",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
|
||
"Impact": "Low",
|
||
"Public": "20220605"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-32981",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981",
|
||
"Impact": "High",
|
||
"Public": "20220610"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3303",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3303",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3344",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-440",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344",
|
||
"Impact": "Low",
|
||
"Public": "20221025"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33743",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
|
||
"Impact": "High",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33744",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744",
|
||
"Impact": "Low",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33981",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981",
|
||
"Impact": "Low",
|
||
"Public": "20220618"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34494",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34495",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3521",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3521",
|
||
"Impact": "Low",
|
||
"Public": "20221016"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3543",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543",
|
||
"Impact": "Low",
|
||
"Public": "20221017"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3544",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3544",
|
||
"Impact": "Low",
|
||
"Public": "20221017"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3586",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3586",
|
||
"Impact": "Low",
|
||
"Public": "20221019"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3594",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3595",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
|
||
"Impact": "Low",
|
||
"Public": "20221018"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36123",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36123",
|
||
"Impact": "High",
|
||
"Public": "20220729"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36280",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36879",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
|
||
"Impact": "Low",
|
||
"Public": "20220727"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3707",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
|
||
"Impact": "Low",
|
||
"Public": "20230306"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38457",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39188",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
|
||
"Impact": "Low",
|
||
"Public": "20220902"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39189",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
|
||
"Impact": "High",
|
||
"Public": "20220902"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39190",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190",
|
||
"Impact": "Low",
|
||
"Public": "20220902"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39842",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39842",
|
||
"Impact": "Low",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40133",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40307",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40307",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40476",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40768",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40768",
|
||
"Impact": "Low",
|
||
"Public": "20220918"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41218",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
|
||
"Impact": "Low",
|
||
"Public": "20220921"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41222",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
|
||
"Impact": "High",
|
||
"Public": "20220921"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4127",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4127",
|
||
"Impact": "Low",
|
||
"Public": "20221128"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41848",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41849",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41850",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-42328",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42328",
|
||
"Impact": "Low",
|
||
"Public": "20221207"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-42329",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42329",
|
||
"Impact": "Low",
|
||
"Public": "20221207"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-42703",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
|
||
"Impact": "Low",
|
||
"Public": "20221009"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-42721",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
|
||
"Impact": "Low",
|
||
"Public": "20221014"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-42722",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
|
||
"Impact": "Low",
|
||
"Public": "20221014"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4379",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4379",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-43945",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
|
||
"Impact": "High",
|
||
"Public": "20221104"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-44032",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032",
|
||
"Impact": "Low",
|
||
"Public": "20221030"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-44033",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033",
|
||
"Impact": "Low",
|
||
"Public": "20221030"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-44034",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034",
|
||
"Impact": "Low",
|
||
"Public": "20221030"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45869",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869",
|
||
"Impact": "Low",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45884",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884",
|
||
"Impact": "High",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45885",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885",
|
||
"Impact": "High",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45886",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886",
|
||
"Impact": "High",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45887",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887",
|
||
"Impact": "Low",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45888",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888",
|
||
"Impact": "Low",
|
||
"Public": "20221125"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45919",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919",
|
||
"Impact": "High",
|
||
"Public": "20221127"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4662",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-455",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4696",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4696",
|
||
"Impact": "High",
|
||
"Public": "20230111"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-47520",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520",
|
||
"Impact": "High",
|
||
"Public": "20221218"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-47929",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-48423",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423",
|
||
"Impact": "High",
|
||
"Public": "20230319"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0458",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458",
|
||
"Impact": "Low",
|
||
"Public": "20230426"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0468",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0469",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0590",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
|
||
"Impact": "Low",
|
||
"Public": "20230323"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1095",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1195",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
|
||
"Impact": "Low",
|
||
"Public": "20230518"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1249",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249",
|
||
"Impact": "Low",
|
||
"Public": "20230323"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1382",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
|
||
"Impact": "Low",
|
||
"Public": "20230419"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1838",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1838",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1872",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
|
||
"Impact": "High",
|
||
"Public": "20230412"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2006",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006",
|
||
"Impact": "High",
|
||
"Public": "20230424"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2007",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2007",
|
||
"Impact": "High",
|
||
"Public": "20230424"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2008",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008",
|
||
"Impact": "High",
|
||
"Public": "20230414"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2019",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2019",
|
||
"Impact": "Low",
|
||
"Public": "20230424"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2166",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166",
|
||
"Impact": "Low",
|
||
"Public": "20230419"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2177",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
|
||
"Impact": "Low",
|
||
"Public": "20230420"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22995",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22996",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-772",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22997",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22998",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-436",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22999",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23000",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23001",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23002",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23003",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23004",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23004",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23006",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23006",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23454",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
|
||
"Impact": "Low",
|
||
"Public": "20230112"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23455",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455",
|
||
"Impact": "Low",
|
||
"Public": "20230112"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23559",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559",
|
||
"Impact": "High",
|
||
"Public": "20230113"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-25012",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012",
|
||
"Impact": "Low",
|
||
"Public": "20230202"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2513",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513",
|
||
"Impact": "Low",
|
||
"Public": "20230508"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26242",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242",
|
||
"Impact": "High",
|
||
"Public": "20230221"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26545",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545",
|
||
"Impact": "Low",
|
||
"Public": "20230225"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28327",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28327",
|
||
"Impact": "Low",
|
||
"Public": "20230419"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3111",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3111",
|
||
"Impact": "High",
|
||
"Public": "20230605"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3159",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159",
|
||
"Impact": "Low",
|
||
"Public": "20230612"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32269",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269",
|
||
"Impact": "Low",
|
||
"Public": "20230505"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814001",
|
||
"Comment": "kernel-headers-modules-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814002",
|
||
"Comment": "kernel-headers-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814003",
|
||
"Comment": "kernel-image-domU-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814004",
|
||
"Comment": "kernel-image-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814005",
|
||
"Comment": "kernel-image-rt-checkinstall is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814006",
|
||
"Comment": "kernel-modules-drm-ancient-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814007",
|
||
"Comment": "kernel-modules-drm-nouveau-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814008",
|
||
"Comment": "kernel-modules-drm-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231814009",
|
||
"Comment": "kernel-modules-staging-rt is earlier than 0:6.1.28-alt1.rt10"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |