vuln-list-alt/oval/c9f2/ALT-PU-2021-3436/definitions.json
2024-02-14 09:47:22 +00:00

3024 lines
156 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213436",
"Version": "oval:org.altlinux.errata:def:20213436",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3436: package `chromium-gost` update to version 96.0.4664.45-alt2.c9.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3436",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3436",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-04010",
"RefURL": "https://bdu.fstec.ru/vul/2021-04010",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04011",
"RefURL": "https://bdu.fstec.ru/vul/2021-04011",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04012",
"RefURL": "https://bdu.fstec.ru/vul/2021-04012",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04013",
"RefURL": "https://bdu.fstec.ru/vul/2021-04013",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04238",
"RefURL": "https://bdu.fstec.ru/vul/2021-04238",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04239",
"RefURL": "https://bdu.fstec.ru/vul/2021-04239",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04240",
"RefURL": "https://bdu.fstec.ru/vul/2021-04240",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04241",
"RefURL": "https://bdu.fstec.ru/vul/2021-04241",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04242",
"RefURL": "https://bdu.fstec.ru/vul/2021-04242",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04243",
"RefURL": "https://bdu.fstec.ru/vul/2021-04243",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04772",
"RefURL": "https://bdu.fstec.ru/vul/2021-04772",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04779",
"RefURL": "https://bdu.fstec.ru/vul/2021-04779",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04783",
"RefURL": "https://bdu.fstec.ru/vul/2021-04783",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04788",
"RefURL": "https://bdu.fstec.ru/vul/2021-04788",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04790",
"RefURL": "https://bdu.fstec.ru/vul/2021-04790",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04791",
"RefURL": "https://bdu.fstec.ru/vul/2021-04791",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04792",
"RefURL": "https://bdu.fstec.ru/vul/2021-04792",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04793",
"RefURL": "https://bdu.fstec.ru/vul/2021-04793",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04794",
"RefURL": "https://bdu.fstec.ru/vul/2021-04794",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04795",
"RefURL": "https://bdu.fstec.ru/vul/2021-04795",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04796",
"RefURL": "https://bdu.fstec.ru/vul/2021-04796",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05094",
"RefURL": "https://bdu.fstec.ru/vul/2021-05094",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05102",
"RefURL": "https://bdu.fstec.ru/vul/2021-05102",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05181",
"RefURL": "https://bdu.fstec.ru/vul/2021-05181",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05205",
"RefURL": "https://bdu.fstec.ru/vul/2021-05205",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05218",
"RefURL": "https://bdu.fstec.ru/vul/2021-05218",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05226",
"RefURL": "https://bdu.fstec.ru/vul/2021-05226",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05227",
"RefURL": "https://bdu.fstec.ru/vul/2021-05227",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05350",
"RefURL": "https://bdu.fstec.ru/vul/2021-05350",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05432",
"RefURL": "https://bdu.fstec.ru/vul/2021-05432",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05433",
"RefURL": "https://bdu.fstec.ru/vul/2021-05433",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05464",
"RefURL": "https://bdu.fstec.ru/vul/2021-05464",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05500",
"RefURL": "https://bdu.fstec.ru/vul/2021-05500",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05503",
"RefURL": "https://bdu.fstec.ru/vul/2021-05503",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05504",
"RefURL": "https://bdu.fstec.ru/vul/2021-05504",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05505",
"RefURL": "https://bdu.fstec.ru/vul/2021-05505",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05507",
"RefURL": "https://bdu.fstec.ru/vul/2021-05507",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05583",
"RefURL": "https://bdu.fstec.ru/vul/2021-05583",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05584",
"RefURL": "https://bdu.fstec.ru/vul/2021-05584",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05589",
"RefURL": "https://bdu.fstec.ru/vul/2021-05589",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05590",
"RefURL": "https://bdu.fstec.ru/vul/2021-05590",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05591",
"RefURL": "https://bdu.fstec.ru/vul/2021-05591",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05615",
"RefURL": "https://bdu.fstec.ru/vul/2021-05615",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05637",
"RefURL": "https://bdu.fstec.ru/vul/2021-05637",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05839",
"RefURL": "https://bdu.fstec.ru/vul/2021-05839",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05870",
"RefURL": "https://bdu.fstec.ru/vul/2021-05870",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05925",
"RefURL": "https://bdu.fstec.ru/vul/2021-05925",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06078",
"RefURL": "https://bdu.fstec.ru/vul/2021-06078",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06079",
"RefURL": "https://bdu.fstec.ru/vul/2021-06079",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06080",
"RefURL": "https://bdu.fstec.ru/vul/2021-06080",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06081",
"RefURL": "https://bdu.fstec.ru/vul/2021-06081",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06082",
"RefURL": "https://bdu.fstec.ru/vul/2021-06082",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06085",
"RefURL": "https://bdu.fstec.ru/vul/2021-06085",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06093",
"RefURL": "https://bdu.fstec.ru/vul/2021-06093",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06094",
"RefURL": "https://bdu.fstec.ru/vul/2021-06094",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06131",
"RefURL": "https://bdu.fstec.ru/vul/2021-06131",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06138",
"RefURL": "https://bdu.fstec.ru/vul/2021-06138",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06193",
"RefURL": "https://bdu.fstec.ru/vul/2021-06193",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06262",
"RefURL": "https://bdu.fstec.ru/vul/2021-06262",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06418",
"RefURL": "https://bdu.fstec.ru/vul/2021-06418",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06420",
"RefURL": "https://bdu.fstec.ru/vul/2021-06420",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06421",
"RefURL": "https://bdu.fstec.ru/vul/2021-06421",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06423",
"RefURL": "https://bdu.fstec.ru/vul/2021-06423",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06424",
"RefURL": "https://bdu.fstec.ru/vul/2021-06424",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06425",
"RefURL": "https://bdu.fstec.ru/vul/2021-06425",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06426",
"RefURL": "https://bdu.fstec.ru/vul/2021-06426",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06427",
"RefURL": "https://bdu.fstec.ru/vul/2021-06427",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06428",
"RefURL": "https://bdu.fstec.ru/vul/2021-06428",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06429",
"RefURL": "https://bdu.fstec.ru/vul/2021-06429",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06430",
"RefURL": "https://bdu.fstec.ru/vul/2021-06430",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06431",
"RefURL": "https://bdu.fstec.ru/vul/2021-06431",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00030",
"RefURL": "https://bdu.fstec.ru/vul/2022-00030",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00043",
"RefURL": "https://bdu.fstec.ru/vul/2022-00043",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00045",
"RefURL": "https://bdu.fstec.ru/vul/2022-00045",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00046",
"RefURL": "https://bdu.fstec.ru/vul/2022-00046",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00050",
"RefURL": "https://bdu.fstec.ru/vul/2022-00050",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00051",
"RefURL": "https://bdu.fstec.ru/vul/2022-00051",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00052",
"RefURL": "https://bdu.fstec.ru/vul/2022-00052",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00053",
"RefURL": "https://bdu.fstec.ru/vul/2022-00053",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00054",
"RefURL": "https://bdu.fstec.ru/vul/2022-00054",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00056",
"RefURL": "https://bdu.fstec.ru/vul/2022-00056",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00058",
"RefURL": "https://bdu.fstec.ru/vul/2022-00058",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00059",
"RefURL": "https://bdu.fstec.ru/vul/2022-00059",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00060",
"RefURL": "https://bdu.fstec.ru/vul/2022-00060",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00061",
"RefURL": "https://bdu.fstec.ru/vul/2022-00061",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00062",
"RefURL": "https://bdu.fstec.ru/vul/2022-00062",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00063",
"RefURL": "https://bdu.fstec.ru/vul/2022-00063",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00064",
"RefURL": "https://bdu.fstec.ru/vul/2022-00064",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00066",
"RefURL": "https://bdu.fstec.ru/vul/2022-00066",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00067",
"RefURL": "https://bdu.fstec.ru/vul/2022-00067",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00068",
"RefURL": "https://bdu.fstec.ru/vul/2022-00068",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00070",
"RefURL": "https://bdu.fstec.ru/vul/2022-00070",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00071",
"RefURL": "https://bdu.fstec.ru/vul/2022-00071",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00074",
"RefURL": "https://bdu.fstec.ru/vul/2022-00074",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00075",
"RefURL": "https://bdu.fstec.ru/vul/2022-00075",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00076",
"RefURL": "https://bdu.fstec.ru/vul/2022-00076",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00077",
"RefURL": "https://bdu.fstec.ru/vul/2022-00077",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00079",
"RefURL": "https://bdu.fstec.ru/vul/2022-00079",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00080",
"RefURL": "https://bdu.fstec.ru/vul/2022-00080",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00142",
"RefURL": "https://bdu.fstec.ru/vul/2022-00142",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00158",
"RefURL": "https://bdu.fstec.ru/vul/2022-00158",
"Source": "BDU"
},
{
"RefID": "CVE-2021-30590",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30590",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30591",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30591",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30592",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30592",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30593",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30593",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30594",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30594",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30596",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30596",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30597",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30597",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30598",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30598",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30599",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30599",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30600",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30600",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30601",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30601",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30602",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30602",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30603",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30603",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30604",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30604",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30606",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30606",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30607",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30607",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30608",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30609",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30610",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30611",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30611",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30612",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30612",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30613",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30613",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30614",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30615",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30615",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30616",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30616",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30617",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30617",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30618",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30618",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30619",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30619",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30620",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30620",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30621",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30621",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30622",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30622",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30623",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30623",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30624",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30624",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30625",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30625",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30626",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30626",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30627",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30627",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30628",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30628",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30629",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30629",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30630",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30630",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30631",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30631",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30632",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30633",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37956",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37956",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37957",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37957",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37958",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37958",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37959",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37959",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37960",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37960",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37961",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37961",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37962",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37962",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37963",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37963",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37964",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37965",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37965",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37966",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37966",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37967",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37968",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37968",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37969",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37969",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37970",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37970",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37971",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37971",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37972",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37972",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37973",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37974",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37975",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37975",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37976",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37976",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37977",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37977",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37978",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37978",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37979",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37979",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37980",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37980",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37981",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37981",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37982",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37982",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37983",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37983",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37984",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37984",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37985",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37985",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37986",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37986",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37987",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37987",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37988",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37988",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37989",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37989",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37990",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37990",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37991",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37991",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37992",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37992",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37993",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37993",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37994",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37994",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37995",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37995",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37996",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37996",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37997",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37997",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37998",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37999",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37999",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38000",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38000",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38001",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38001",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38002",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38003",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38003",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38004",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38004",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38005",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38005",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38006",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38006",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38007",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38007",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38008",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38008",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38009",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38009",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38010",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38010",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38011",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38011",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38012",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38012",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38013",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38013",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38014",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38014",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38015",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38015",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38016",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38016",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38017",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38017",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38018",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38018",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38019",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38019",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38020",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38020",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38021",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38021",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38022",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38022",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium-gost to version 96.0.4664.45-alt2.c9.1. \nSecurity Fix(es):\n\n * BDU:2021-04010: Уязвимость элемента управления «Bookmarks» («Закладки») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04011: Уязвимость интерфейса File System API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04012: Уязвимость компонента Tab Groups браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04013: Уязвимость компонента Page Info UI браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04238: Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04239: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04240: Уязвимость компонента Extensions API браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04241: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04242: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04243: Уязвимость функции печати браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04772: Уязвимость компонента макета модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04779: Уязвимость компонента входа в систему Sign-In браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04783: Уязвимость компонента Selection API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04788: Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-04790: Уязвимость модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04791: Уязвимость интерфейса для хранения структурированных данных Indexed DB API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04792: Уязвимость компонента Permissions браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04793: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04794: Уязвимость компонента макета модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04795: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04796: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-05094: Уязвимость функции TabStrip браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2021-05102: Уязвимость набора инструментов DevTools браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2021-05181: Уязвимость компонента WebRTC веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-05205: Уязвимость компонента Browser UI веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-05218: Уязвимость компонента Tab Strip веб-браузера Google Chrome, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2021-05226: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05227: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к системе\n\n * BDU:2021-05350: Уязвимость обработчика Java-Script сценариев Blink браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность\n\n * BDU:2021-05432: Уязвимость настройки разрешений Permissions браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-05433: Уязвимость модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05464: Уязвимость прикладного программного интерфейса для обмена данными Web Share браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность\n\n * BDU:2021-05500: Уязвимость компонента входа в систему Sign-In браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05503: Уязвимость компонента Garbage Collection браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05504: Уязвимость компонента Web Transport браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05505: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05507: Уязвимость компонента Portals браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выйти из изолированной программной среды\n\n * BDU:2021-05583: Уязвимость компонента storage foundation браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05584: Уязвимость компонента loader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05589: Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05590: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05591: Уязвимость компонента Garbage Collection браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05615: Уязвимость функции Автозаполнения Autofil браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-05637: Уязвимость реализации компонента «New Tab Page» («Новая вкладка») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05839: Уязвимость компонента Swiftshader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05870: Уязвимость компонента Contacts Picker браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-05925: Уязвимость компонента Navigation браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06078: Уязвимость элемента управления «Bookmarks» («Закладки») браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06079: Уязвимость компонента автодополнения Autofill браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06080: Уязвимость компонента Media браузера Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06081: Уязвимость компонента автодополнения Autofill браузера Microsoft Edge, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-06082: Уязвимость модуля отображения Blink браузера Microsoft Edge, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2021-06085: Уязвимость установщика веб-приложений браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06093: Уязвимость компонента Navigation браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-06094: Уязвимость реализации ввода текста браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-06131: Уязвимость реализации механизма CORS браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06138: Уязвимость компонента Referer браузера Google Chrome, связанная с неправильно реализованной проверкой безопасности для стандартных элементов, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-06193: Уязвимость кодека libjpeg-turbo, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2021-06262: Уязвимость изолированной среды iframe браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06418: Уязвимость расширения WebRTC браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06420: Уязвимость функции фоновой загрузки браузера Google Chrome, позволяющая нарушителю обойти политику безопасности контента и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06421: Уязвимость автономного режима браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить код в контексте привилегированного процесса\n\n * BDU:2021-06423: Уязвимость функции загрузок браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-06424: Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06425: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-06426: Уязвимость реализации функции автозаполнения Autofill браузера Microsoft Edge, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-06427: Уязвимость реализации технологии WebRTC браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06428: Уязвимость функции Navigation браузера Google Chrome, связанная с недостатком в механизме подтверждения источника, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2021-06429: Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-06430: Уязвимость компонента для отображения веб-страниц WebView браузера Google Chrome, операционной системы Android, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06431: Уязвимость интерфейса File System API браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-00030: Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-00043: Уязвимость службы Service Worker браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00045: Уязвимость обработчика PDF-содержимого PDFium браузеров Google Chrome и Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00046: Уязвимость компонента Profiles браузера Google Chrome, позволяющая нарушителю перенаправить пользователей на вредоносную веб-страницу\n\n * BDU:2022-00050: Уязвимость приложение для загрузки программ Google Updater браузера Google Chrome, операционной системы Windows , связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии через созданный файл\n\n * BDU:2022-00051: Уязвимость компонента Tab Strip браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00052: Уязвимость функции Navigation браузера Google Chrome, операционной системы Windows , позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00053: Уязвимость диспетчера задач браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2022-00054: Уязвимость компонента ChromeOS Networking браузера Google Chrome, позволяющая нарушителю получить привилегированный доступ к инфраструктуре через созданный файл ONC\n\n * BDU:2022-00056: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00058: Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды\n\n * BDU:2022-00059: Уязвимость API для работы с компьютерной графикой WebGPU браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00060: Уязвимость компонента Performance Manager браузера Google Chrome, позволяющая нарушителю выполнить код в контексте привилегированного процесса с помощью специально созданной HTML страницы\n\n * BDU:2022-00061: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00062: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00063: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера с помощью специально созданной HTML страницы\n\n * BDU:2022-00064: Уязвимость режима инкогнито браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00066: Уязвимость настроек Settings браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00067: Уязвимость компонента cache браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00068: Уязвимость компонента iFrame Sandbox браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00070: Уязвимость механизма отображения веб-страниц Blink браузера Microsoft Edge, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2022-00071: Уязвимость установщика WebApp браузера Google Chrome , позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы\n\n * BDU:2022-00074: Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющие нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00075: Уязвимость компонента compositing браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы\n\n * BDU:2022-00076: Уязвимость программного интерфейса Background Fetch API браузера Google Chrome , связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00077: Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00079: Уязвимость браузера Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2022-00080: Уязвимость сетевых API браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00142: Уязвимость механизма аутентификации пользователей WebAuthentication браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-00158: Уязвимость реализации функции распознавания отпечатков пальцев браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2021-30590: Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30591: Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30592: Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.\n\n * CVE-2021-30593: Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2021-30594: Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.\n\n * CVE-2021-30596: Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-30597: Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.\n\n * CVE-2021-30598: Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2021-30599: Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2021-30600: Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30601: Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30602: Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30603: Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30604: Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30606: Chromium: CVE-2021-30606 Use after free in Blink\n\n * CVE-2021-30607: Chromium: CVE-2021-30607 Use after free in Permissions\n\n * CVE-2021-30608: Chromium: CVE-2021-30608 Use after free in Web Share\n\n * CVE-2021-30609: Chromium: CVE-2021-30609 Use after free in Sign-In\n\n * CVE-2021-30610: Chromium: CVE-2021-30610 Use after free in Extensions API\n\n * CVE-2021-30611: Chromium: CVE-2021-30611 Use after free in WebRTC\n\n * CVE-2021-30612: Chromium: CVE-2021-30612 Use after free in WebRTC\n\n * CVE-2021-30613: Chromium: CVE-2021-30613 Use after free in Base internals\n\n * CVE-2021-30614: Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip\n\n * CVE-2021-30615: Chromium: CVE-2021-30615 Cross-origin data leak in Navigation\n\n * CVE-2021-30616: Chromium: CVE-2021-30616 Use after free in Media\n\n * CVE-2021-30617: Chromium: CVE-2021-30617 Policy bypass in Blink\n\n * CVE-2021-30618: Chromium: CVE-2021-30618 Inappropriate implementation in DevTools\n\n * CVE-2021-30619: Chromium: CVE-2021-30619 UI Spoofing in Autofill\n\n * CVE-2021-30620: Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink\n\n * CVE-2021-30621: Chromium: CVE-2021-30621 UI Spoofing in Autofill\n\n * CVE-2021-30622: Chromium: CVE-2021-30622 Use after free in WebApp Installs\n\n * CVE-2021-30623: Chromium: CVE-2021-30623 Use after free in Bookmarks\n\n * CVE-2021-30624: Chromium: CVE-2021-30624 Use after free in Autofill\n\n * CVE-2021-30625: Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30626: Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30627: Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30628: Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.\n\n * CVE-2021-30629: Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30630: Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-30631: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n\n * CVE-2021-30632: Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30633: Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-37956: Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37957: Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37958: Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.\n\n * CVE-2021-37959: Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37960: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n\n * CVE-2021-37961: Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37962: Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37963: Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2021-37964: Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.\n\n * CVE-2021-37965: Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-37966: Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-37967: Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-37968: Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-37969: Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.\n\n * CVE-2021-37970: Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37971: Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-37972: Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37973: Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-37974: Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37975: Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37976: Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2021-37977: Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37978: Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37979: heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37980: Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.\n\n * CVE-2021-37981: Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-37982: Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37983: Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37984: Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37985: Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37986: Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37987: Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37988: Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37989: Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.\n\n * CVE-2021-37990: Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.\n\n * CVE-2021-37991: Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37992: Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37993: Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37994: Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2021-37995: Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-37996: Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.\n\n * CVE-2021-37997: Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37998: Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37999: Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.\n\n * CVE-2021-38000: Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.\n\n * CVE-2021-38001: Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38002: Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-38003: Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38004: Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-38005: Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38006: Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38007: Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38008: Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38009: Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-38010: Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.\n\n * CVE-2021-38011: Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38012: Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38013: Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-38014: Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-38015: Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2021-38016: Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2021-38017: Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2021-38018: Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2021-38019: Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-38020: Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-38021: Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2021-38022: Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * #40806: Собрать с поддержкой pipewire\n\n * #41094: Не запускается chromium-gost из консоли и из меню\n\n * #41247: Некорректное отображение окна браузера на системе с xfce",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-12-01"
},
"Updated": {
"Date": "2021-12-01"
},
"bdu": [
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-04010",
"Impact": "High",
"Public": "20210709",
"CveID": "BDU:2021-04010"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04011",
"Impact": "High",
"Public": "20210714",
"CveID": "BDU:2021-04011"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-04012",
"Impact": "High",
"Public": "20210515",
"CveID": "BDU:2021-04012"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04013",
"Impact": "High",
"Public": "20210610",
"CveID": "BDU:2021-04013"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04238",
"Impact": "High",
"Public": "20210730",
"CveID": "BDU:2021-04238"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2021-04239",
"Impact": "High",
"Public": "20210727",
"CveID": "BDU:2021-04239"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04240",
"Impact": "High",
"Public": "20210728",
"CveID": "BDU:2021-04240"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04241",
"Impact": "High",
"Public": "20210730",
"CveID": "BDU:2021-04241"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04242",
"Impact": "High",
"Public": "20210730",
"CveID": "BDU:2021-04242"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04243",
"Impact": "High",
"Public": "20210720",
"CveID": "BDU:2021-04243"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04772",
"Impact": "High",
"Public": "20210901",
"CveID": "BDU:2021-04772"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04779",
"Impact": "High",
"Public": "20210813",
"CveID": "BDU:2021-04779"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04783",
"Impact": "High",
"Public": "20210806",
"CveID": "BDU:2021-04783"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04788",
"Impact": "High",
"Public": "20210419",
"CveID": "BDU:2021-04788"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-04790",
"Impact": "High",
"Public": "20210830",
"CveID": "BDU:2021-04790"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04791",
"Impact": "High",
"Public": "20210908",
"CveID": "BDU:2021-04791"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04792",
"Impact": "High",
"Public": "20210826",
"CveID": "BDU:2021-04792"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-119, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-04793",
"Impact": "High",
"Public": "20210908",
"CveID": "BDU:2021-04793"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04794",
"Impact": "High",
"Public": "20210906",
"CveID": "BDU:2021-04794"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-121",
"Href": "https://bdu.fstec.ru/vul/2021-04795",
"Impact": "High",
"Public": "20210818",
"CveID": "BDU:2021-04795"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04796",
"Impact": "High",
"Public": "20210818",
"CveID": "BDU:2021-04796"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-05094",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-05094"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-05102",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-05102"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05181",
"Impact": "High",
"Public": "20210719",
"CveID": "BDU:2021-05181"
},
{
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05205",
"Impact": "Low",
"Public": "20210724",
"CveID": "BDU:2021-05205"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"Cwe": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-05218",
"Impact": "High",
"Public": "20210516",
"CveID": "BDU:2021-05218"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-749",
"Href": "https://bdu.fstec.ru/vul/2021-05226",
"Impact": "High",
"Public": "20211028",
"CveID": "BDU:2021-05226"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-05227",
"Impact": "High",
"Public": "20211028",
"CveID": "BDU:2021-05227"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05350",
"Impact": "High",
"Public": "20210831",
"CveID": "BDU:2021-05350"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05432",
"Impact": "High",
"Public": "20210831",
"CveID": "BDU:2021-05432"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-119, CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-05433",
"Impact": "High",
"Public": "20210804",
"CveID": "BDU:2021-05433"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05464",
"Impact": "High",
"Public": "20210831",
"CveID": "BDU:2021-05464"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05500",
"Impact": "High",
"Public": "20211014",
"CveID": "BDU:2021-05500"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05503",
"Impact": "High",
"Public": "20211013",
"CveID": "BDU:2021-05503"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05504",
"Impact": "High",
"Public": "20211016",
"CveID": "BDU:2021-05504"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-05505",
"Impact": "High",
"Public": "20211016",
"CveID": "BDU:2021-05505"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05507",
"Impact": "Critical",
"Public": "20210921",
"CveID": "BDU:2021-05507"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-21",
"Href": "https://bdu.fstec.ru/vul/2021-05583",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-05583"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05584",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-05584"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05589",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-05589"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-05590",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-05590"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05591",
"Impact": "High",
"Public": "20210914",
"CveID": "BDU:2021-05591"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2021-05615",
"Impact": "Low",
"Public": "20210707",
"CveID": "BDU:2021-05615"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-05637",
"Impact": "Low",
"Public": "20210921",
"CveID": "BDU:2021-05637"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-05839",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-05839"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"Cwe": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-05870",
"Impact": "Low",
"Public": "20211115",
"CveID": "BDU:2021-05870"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "CWE-200, CWE-668",
"Href": "https://bdu.fstec.ru/vul/2021-05925",
"Impact": "Low",
"Public": "20210512",
"CveID": "BDU:2021-05925"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06078",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06078"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06079",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06079"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06080",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06080"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2021-06081",
"Impact": "Low",
"Public": "20210903",
"CveID": "BDU:2021-06081"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-06082",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06082"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06085",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06085"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-06093",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-06093"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-06094",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-06094"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"Cwe": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-06131",
"Impact": "Low",
"Public": "20211115",
"CveID": "BDU:2021-06131"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-06138",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2021-06138"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"Cwe": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06193",
"Impact": "Low",
"Public": "20210921",
"CveID": "BDU:2021-06193"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"Cwe": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-06262",
"Impact": "Low",
"Public": "20211115",
"CveID": "BDU:2021-06262"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06418",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06418"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"Cwe": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-06420",
"Impact": "Low",
"Public": "20211015",
"CveID": "BDU:2021-06420"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06421",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2021-06421"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-06423",
"Impact": "Low",
"Public": "20211102",
"CveID": "BDU:2021-06423"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2021-06424",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2021-06424"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2021-06425",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2021-06425"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2021-06426",
"Impact": "Low",
"Public": "20210903",
"CveID": "BDU:2021-06426"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06427",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2021-06427"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2021-06428",
"Impact": "Low",
"Public": "20210826",
"CveID": "BDU:2021-06428"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06429",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2021-06429"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-06430",
"Impact": "Low",
"Public": "20211102",
"CveID": "BDU:2021-06430"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06431",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2021-06431"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-00030",
"Impact": "Low",
"Public": "20211115",
"CveID": "BDU:2022-00030"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00043",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2022-00043"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00045",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00045"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00046",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00046"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2022-00050",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2022-00050"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00051",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2022-00051"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00052",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00052"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00053",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2022-00053"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00054",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00054"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-1021",
"Href": "https://bdu.fstec.ru/vul/2022-00056",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00056"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00058",
"Impact": "Critical",
"Public": "20211102",
"CveID": "BDU:2022-00058"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00059",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2022-00059"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00060",
"Impact": "High",
"Public": "20211008",
"CveID": "BDU:2022-00060"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-00061",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00061"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00062",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00062"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00063",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00063"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00064",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00064"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00066",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00066"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00067",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2022-00067"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00068",
"Impact": "Low",
"Public": "20211102",
"CveID": "BDU:2022-00068"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2022-00070",
"Impact": "Low",
"Public": "20210903",
"CveID": "BDU:2022-00070"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00071",
"Impact": "Low",
"Public": "20211102",
"CveID": "BDU:2022-00071"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2022-00074",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00074"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2022-00075",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00075"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-00076",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00076"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-00077",
"Impact": "Low",
"Public": "20211008",
"CveID": "BDU:2022-00077"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00079",
"Impact": "High",
"Public": "20210903",
"CveID": "BDU:2022-00079"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00080",
"Impact": "High",
"Public": "20211102",
"CveID": "BDU:2022-00080"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00142",
"Impact": "Low",
"Public": "20211115",
"CveID": "BDU:2022-00142"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00158",
"Impact": "High",
"Public": "20211115",
"CveID": "BDU:2022-00158"
}
],
"Cves": [
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30590",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30590"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30591",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30591"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30592",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30592"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"Cwe": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30593",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30593"
},
{
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30594",
"Impact": "Low",
"Public": "20210826",
"CveID": "CVE-2021-30594"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30596",
"Impact": "Low",
"Public": "20210826",
"CveID": "CVE-2021-30596"
},
{
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30597",
"Impact": "Low",
"Public": "20210826",
"CveID": "CVE-2021-30597"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30598",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30598"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30599",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30599"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30600",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30600"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30601",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30601"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30602",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30602"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30603",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30603"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30604",
"Impact": "High",
"Public": "20210826",
"CveID": "CVE-2021-30604"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30606",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30606"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30607",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30607"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30608",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30608"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30609",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30609"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30610",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30610"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30611",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30611"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30612",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30612"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30613",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30613"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30614",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30614"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30615",
"Impact": "Low",
"Public": "20210903",
"CveID": "CVE-2021-30615"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30616",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30616"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30617",
"Impact": "Low",
"Public": "20210903",
"CveID": "CVE-2021-30617"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30618",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30618"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30619",
"Impact": "Low",
"Public": "20210903",
"CveID": "CVE-2021-30619"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30620",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30620"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30621",
"Impact": "Low",
"Public": "20210903",
"CveID": "CVE-2021-30621"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30622",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30622"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30623",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30623"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30624",
"Impact": "High",
"Public": "20210903",
"CveID": "CVE-2021-30624"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30625",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-30625"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30626",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-30626"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30627",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-30627"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30628",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-30628"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30629",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-30629"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30630",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-30630"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30631",
"Impact": "None",
"Public": "20211102",
"CveID": "CVE-2021-30631"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-30632"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633",
"Impact": "Critical",
"Public": "20211008",
"CveID": "CVE-2021-30633"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37956",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37956"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37957",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37957"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37958",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37958"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37959",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37959"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37960",
"Impact": "None",
"Public": "20211102",
"CveID": "CVE-2021-37960"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37961",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37961"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37962",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37962"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37963",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37963"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37964",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37964"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37965",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37965"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37966",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37966"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37967",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37967"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37968",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37968"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37969",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37969"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37970",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37970"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37971",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37971"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37972",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37972"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37973",
"Impact": "Critical",
"Public": "20211008",
"CveID": "CVE-2021-37973"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37974",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37974"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37975",
"Impact": "High",
"Public": "20211008",
"CveID": "CVE-2021-37975"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37976",
"Impact": "Low",
"Public": "20211008",
"CveID": "CVE-2021-37976"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37977",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37977"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37978",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37978"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37979",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37979"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37980",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37980"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37981",
"Impact": "Critical",
"Public": "20211102",
"CveID": "CVE-2021-37981"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37982",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37982"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37983",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37983"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37984",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37984"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37985",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37985"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37986",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37986"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37987",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37987"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37988",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37988"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37989",
"Impact": "Low",
"Public": "20211102",
"CveID": "CVE-2021-37989"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37990",
"Impact": "Low",
"Public": "20211102",
"CveID": "CVE-2021-37990"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37991",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37991"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37992",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37992"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37993",
"Impact": "High",
"Public": "20211102",
"CveID": "CVE-2021-37993"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37994",
"Impact": "Low",
"Public": "20211102",
"CveID": "CVE-2021-37994"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37995",
"Impact": "Low",
"Public": "20211102",
"CveID": "CVE-2021-37995"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37996",
"Impact": "Low",
"Public": "20211102",
"CveID": "CVE-2021-37996"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37997",
"Impact": "High",
"Public": "20211123",
"CveID": "CVE-2021-37997"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37998",
"Impact": "High",
"Public": "20211123",
"CveID": "CVE-2021-37998"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37999",
"Impact": "Low",
"Public": "20211123",
"CveID": "CVE-2021-37999"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38000",
"Impact": "Low",
"Public": "20211123",
"CveID": "CVE-2021-38000"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38001",
"Impact": "High",
"Public": "20211123",
"CveID": "CVE-2021-38001"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38002",
"Impact": "Critical",
"Public": "20211123",
"CveID": "CVE-2021-38002"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38003",
"Impact": "High",
"Public": "20211123",
"CveID": "CVE-2021-38003"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"Cwe": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38004",
"Impact": "Low",
"Public": "20211123",
"CveID": "CVE-2021-38004"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38005",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38005"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38006",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38006"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38007",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38007"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38008",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38008"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38009",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38009"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38010",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38010"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38011",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38011"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38012",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38012"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38013",
"Impact": "Critical",
"Public": "20211223",
"CveID": "CVE-2021-38013"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38014",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38014"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38015",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38015"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38016",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38016"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38017",
"Impact": "High",
"Public": "20211223",
"CveID": "CVE-2021-38017"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38018",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38018"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "CWE-670",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38019",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38019"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"Cwe": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38020",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38020"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38021",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38021"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38022",
"Impact": "Low",
"Public": "20211223",
"CveID": "CVE-2021-38022"
}
],
"Bugzilla": [
{
"Id": "40806",
"Href": "https://bugzilla.altlinux.org/40806",
"Data": "Собрать с поддержкой pipewire"
},
{
"Id": "41094",
"Href": "https://bugzilla.altlinux.org/41094",
"Data": "Не запускается chromium-gost из консоли и из меню"
},
{
"Id": "41247",
"Href": "https://bugzilla.altlinux.org/41247",
"Data": "Некорректное отображение окна браузера на системе с xfce"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213436001",
"Comment": "chromium-gost is earlier than 0:96.0.4664.45-alt2.c9.1"
}
]
}
]
}
}
]
}