vuln-list-alt/oval/c9f2/ALT-PU-2018-1854/definitions.json
2024-06-28 13:17:52 +00:00

5113 lines
294 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181854",
"Version": "oval:org.altlinux.errata:def:20181854",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1854: package `firefox-esr` update to version 60.0.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1854",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1854",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00155",
"RefURL": "https://bdu.fstec.ru/vul/2018-00155",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00156",
"RefURL": "https://bdu.fstec.ru/vul/2018-00156",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00157",
"RefURL": "https://bdu.fstec.ru/vul/2018-00157",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00158",
"RefURL": "https://bdu.fstec.ru/vul/2018-00158",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00160",
"RefURL": "https://bdu.fstec.ru/vul/2018-00160",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00161",
"RefURL": "https://bdu.fstec.ru/vul/2018-00161",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00162",
"RefURL": "https://bdu.fstec.ru/vul/2018-00162",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00163",
"RefURL": "https://bdu.fstec.ru/vul/2018-00163",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00164",
"RefURL": "https://bdu.fstec.ru/vul/2018-00164",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00165",
"RefURL": "https://bdu.fstec.ru/vul/2018-00165",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00166",
"RefURL": "https://bdu.fstec.ru/vul/2018-00166",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00167",
"RefURL": "https://bdu.fstec.ru/vul/2018-00167",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00168",
"RefURL": "https://bdu.fstec.ru/vul/2018-00168",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00169",
"RefURL": "https://bdu.fstec.ru/vul/2018-00169",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00170",
"RefURL": "https://bdu.fstec.ru/vul/2018-00170",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00171",
"RefURL": "https://bdu.fstec.ru/vul/2018-00171",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00172",
"RefURL": "https://bdu.fstec.ru/vul/2018-00172",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00173",
"RefURL": "https://bdu.fstec.ru/vul/2018-00173",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00174",
"RefURL": "https://bdu.fstec.ru/vul/2018-00174",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00175",
"RefURL": "https://bdu.fstec.ru/vul/2018-00175",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00176",
"RefURL": "https://bdu.fstec.ru/vul/2018-00176",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00862",
"RefURL": "https://bdu.fstec.ru/vul/2018-00862",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00864",
"RefURL": "https://bdu.fstec.ru/vul/2018-00864",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00865",
"RefURL": "https://bdu.fstec.ru/vul/2018-00865",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00866",
"RefURL": "https://bdu.fstec.ru/vul/2018-00866",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00867",
"RefURL": "https://bdu.fstec.ru/vul/2018-00867",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00868",
"RefURL": "https://bdu.fstec.ru/vul/2018-00868",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00869",
"RefURL": "https://bdu.fstec.ru/vul/2018-00869",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00870",
"RefURL": "https://bdu.fstec.ru/vul/2018-00870",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00871",
"RefURL": "https://bdu.fstec.ru/vul/2018-00871",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00873",
"RefURL": "https://bdu.fstec.ru/vul/2018-00873",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00874",
"RefURL": "https://bdu.fstec.ru/vul/2018-00874",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00875",
"RefURL": "https://bdu.fstec.ru/vul/2018-00875",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00876",
"RefURL": "https://bdu.fstec.ru/vul/2018-00876",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00877",
"RefURL": "https://bdu.fstec.ru/vul/2018-00877",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00878",
"RefURL": "https://bdu.fstec.ru/vul/2018-00878",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00879",
"RefURL": "https://bdu.fstec.ru/vul/2018-00879",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00880",
"RefURL": "https://bdu.fstec.ru/vul/2018-00880",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01494",
"RefURL": "https://bdu.fstec.ru/vul/2018-01494",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00228",
"RefURL": "https://bdu.fstec.ru/vul/2019-00228",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00229",
"RefURL": "https://bdu.fstec.ru/vul/2019-00229",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00230",
"RefURL": "https://bdu.fstec.ru/vul/2019-00230",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03307",
"RefURL": "https://bdu.fstec.ru/vul/2019-03307",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03308",
"RefURL": "https://bdu.fstec.ru/vul/2019-03308",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03309",
"RefURL": "https://bdu.fstec.ru/vul/2019-03309",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03310",
"RefURL": "https://bdu.fstec.ru/vul/2019-03310",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03311",
"RefURL": "https://bdu.fstec.ru/vul/2019-03311",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03312",
"RefURL": "https://bdu.fstec.ru/vul/2019-03312",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03313",
"RefURL": "https://bdu.fstec.ru/vul/2019-03313",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03314",
"RefURL": "https://bdu.fstec.ru/vul/2019-03314",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03315",
"RefURL": "https://bdu.fstec.ru/vul/2019-03315",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03316",
"RefURL": "https://bdu.fstec.ru/vul/2019-03316",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03317",
"RefURL": "https://bdu.fstec.ru/vul/2019-03317",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03318",
"RefURL": "https://bdu.fstec.ru/vul/2019-03318",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03416",
"RefURL": "https://bdu.fstec.ru/vul/2019-03416",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03417",
"RefURL": "https://bdu.fstec.ru/vul/2019-03417",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03418",
"RefURL": "https://bdu.fstec.ru/vul/2019-03418",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03510",
"RefURL": "https://bdu.fstec.ru/vul/2019-03510",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03511",
"RefURL": "https://bdu.fstec.ru/vul/2019-03511",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03512",
"RefURL": "https://bdu.fstec.ru/vul/2019-03512",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03513",
"RefURL": "https://bdu.fstec.ru/vul/2019-03513",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03514",
"RefURL": "https://bdu.fstec.ru/vul/2019-03514",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03515",
"RefURL": "https://bdu.fstec.ru/vul/2019-03515",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03516",
"RefURL": "https://bdu.fstec.ru/vul/2019-03516",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03517",
"RefURL": "https://bdu.fstec.ru/vul/2019-03517",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03518",
"RefURL": "https://bdu.fstec.ru/vul/2019-03518",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03519",
"RefURL": "https://bdu.fstec.ru/vul/2019-03519",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04383",
"RefURL": "https://bdu.fstec.ru/vul/2019-04383",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04697",
"RefURL": "https://bdu.fstec.ru/vul/2019-04697",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05740",
"RefURL": "https://bdu.fstec.ru/vul/2020-05740",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05741",
"RefURL": "https://bdu.fstec.ru/vul/2020-05741",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05742",
"RefURL": "https://bdu.fstec.ru/vul/2020-05742",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05743",
"RefURL": "https://bdu.fstec.ru/vul/2020-05743",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05744",
"RefURL": "https://bdu.fstec.ru/vul/2020-05744",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05745",
"RefURL": "https://bdu.fstec.ru/vul/2020-05745",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05746",
"RefURL": "https://bdu.fstec.ru/vul/2020-05746",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05747",
"RefURL": "https://bdu.fstec.ru/vul/2020-05747",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05748",
"RefURL": "https://bdu.fstec.ru/vul/2020-05748",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05793",
"RefURL": "https://bdu.fstec.ru/vul/2020-05793",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05801",
"RefURL": "https://bdu.fstec.ru/vul/2020-05801",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05803",
"RefURL": "https://bdu.fstec.ru/vul/2020-05803",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05804",
"RefURL": "https://bdu.fstec.ru/vul/2020-05804",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05833",
"RefURL": "https://bdu.fstec.ru/vul/2020-05833",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05834",
"RefURL": "https://bdu.fstec.ru/vul/2020-05834",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05842",
"RefURL": "https://bdu.fstec.ru/vul/2020-05842",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05843",
"RefURL": "https://bdu.fstec.ru/vul/2020-05843",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05844",
"RefURL": "https://bdu.fstec.ru/vul/2020-05844",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05845",
"RefURL": "https://bdu.fstec.ru/vul/2020-05845",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05846",
"RefURL": "https://bdu.fstec.ru/vul/2020-05846",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05847",
"RefURL": "https://bdu.fstec.ru/vul/2020-05847",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05848",
"RefURL": "https://bdu.fstec.ru/vul/2020-05848",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00020",
"RefURL": "https://bdu.fstec.ru/vul/2021-00020",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00021",
"RefURL": "https://bdu.fstec.ru/vul/2021-00021",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00022",
"RefURL": "https://bdu.fstec.ru/vul/2021-00022",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00023",
"RefURL": "https://bdu.fstec.ru/vul/2021-00023",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00024",
"RefURL": "https://bdu.fstec.ru/vul/2021-00024",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00026",
"RefURL": "https://bdu.fstec.ru/vul/2021-00026",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00028",
"RefURL": "https://bdu.fstec.ru/vul/2021-00028",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00029",
"RefURL": "https://bdu.fstec.ru/vul/2021-00029",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00030",
"RefURL": "https://bdu.fstec.ru/vul/2021-00030",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00031",
"RefURL": "https://bdu.fstec.ru/vul/2021-00031",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00032",
"RefURL": "https://bdu.fstec.ru/vul/2021-00032",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00033",
"RefURL": "https://bdu.fstec.ru/vul/2021-00033",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00034",
"RefURL": "https://bdu.fstec.ru/vul/2021-00034",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00035",
"RefURL": "https://bdu.fstec.ru/vul/2021-00035",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00036",
"RefURL": "https://bdu.fstec.ru/vul/2021-00036",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00037",
"RefURL": "https://bdu.fstec.ru/vul/2021-00037",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00038",
"RefURL": "https://bdu.fstec.ru/vul/2021-00038",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00039",
"RefURL": "https://bdu.fstec.ru/vul/2021-00039",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00041",
"RefURL": "https://bdu.fstec.ru/vul/2021-00041",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00042",
"RefURL": "https://bdu.fstec.ru/vul/2021-00042",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00043",
"RefURL": "https://bdu.fstec.ru/vul/2021-00043",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00044",
"RefURL": "https://bdu.fstec.ru/vul/2021-00044",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00045",
"RefURL": "https://bdu.fstec.ru/vul/2021-00045",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00047",
"RefURL": "https://bdu.fstec.ru/vul/2021-00047",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00048",
"RefURL": "https://bdu.fstec.ru/vul/2021-00048",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00049",
"RefURL": "https://bdu.fstec.ru/vul/2021-00049",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00050",
"RefURL": "https://bdu.fstec.ru/vul/2021-00050",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00051",
"RefURL": "https://bdu.fstec.ru/vul/2021-00051",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00066",
"RefURL": "https://bdu.fstec.ru/vul/2021-00066",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00067",
"RefURL": "https://bdu.fstec.ru/vul/2021-00067",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00068",
"RefURL": "https://bdu.fstec.ru/vul/2021-00068",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00069",
"RefURL": "https://bdu.fstec.ru/vul/2021-00069",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00118",
"RefURL": "https://bdu.fstec.ru/vul/2021-00118",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00119",
"RefURL": "https://bdu.fstec.ru/vul/2021-00119",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00120",
"RefURL": "https://bdu.fstec.ru/vul/2021-00120",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00121",
"RefURL": "https://bdu.fstec.ru/vul/2021-00121",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00122",
"RefURL": "https://bdu.fstec.ru/vul/2021-00122",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00177",
"RefURL": "https://bdu.fstec.ru/vul/2021-00177",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00178",
"RefURL": "https://bdu.fstec.ru/vul/2021-00178",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00179",
"RefURL": "https://bdu.fstec.ru/vul/2021-00179",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00180",
"RefURL": "https://bdu.fstec.ru/vul/2021-00180",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00181",
"RefURL": "https://bdu.fstec.ru/vul/2021-00181",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00182",
"RefURL": "https://bdu.fstec.ru/vul/2021-00182",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00183",
"RefURL": "https://bdu.fstec.ru/vul/2021-00183",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00184",
"RefURL": "https://bdu.fstec.ru/vul/2021-00184",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00209",
"RefURL": "https://bdu.fstec.ru/vul/2021-00209",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00213",
"RefURL": "https://bdu.fstec.ru/vul/2021-00213",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00214",
"RefURL": "https://bdu.fstec.ru/vul/2021-00214",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00215",
"RefURL": "https://bdu.fstec.ru/vul/2021-00215",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00216",
"RefURL": "https://bdu.fstec.ru/vul/2021-00216",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00217",
"RefURL": "https://bdu.fstec.ru/vul/2021-00217",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00218",
"RefURL": "https://bdu.fstec.ru/vul/2021-00218",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00233",
"RefURL": "https://bdu.fstec.ru/vul/2021-00233",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00234",
"RefURL": "https://bdu.fstec.ru/vul/2021-00234",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00235",
"RefURL": "https://bdu.fstec.ru/vul/2021-00235",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00236",
"RefURL": "https://bdu.fstec.ru/vul/2021-00236",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00354",
"RefURL": "https://bdu.fstec.ru/vul/2021-00354",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00355",
"RefURL": "https://bdu.fstec.ru/vul/2021-00355",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00356",
"RefURL": "https://bdu.fstec.ru/vul/2021-00356",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00357",
"RefURL": "https://bdu.fstec.ru/vul/2021-00357",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00360",
"RefURL": "https://bdu.fstec.ru/vul/2021-00360",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00362",
"RefURL": "https://bdu.fstec.ru/vul/2021-00362",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00374",
"RefURL": "https://bdu.fstec.ru/vul/2021-00374",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00375",
"RefURL": "https://bdu.fstec.ru/vul/2021-00375",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00378",
"RefURL": "https://bdu.fstec.ru/vul/2021-00378",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00379",
"RefURL": "https://bdu.fstec.ru/vul/2021-00379",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00380",
"RefURL": "https://bdu.fstec.ru/vul/2021-00380",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00390",
"RefURL": "https://bdu.fstec.ru/vul/2021-00390",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00391",
"RefURL": "https://bdu.fstec.ru/vul/2021-00391",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00392",
"RefURL": "https://bdu.fstec.ru/vul/2021-00392",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00396",
"RefURL": "https://bdu.fstec.ru/vul/2021-00396",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00397",
"RefURL": "https://bdu.fstec.ru/vul/2021-00397",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00417",
"RefURL": "https://bdu.fstec.ru/vul/2021-00417",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00426",
"RefURL": "https://bdu.fstec.ru/vul/2021-00426",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00427",
"RefURL": "https://bdu.fstec.ru/vul/2021-00427",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00501",
"RefURL": "https://bdu.fstec.ru/vul/2021-00501",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04143",
"RefURL": "https://bdu.fstec.ru/vul/2021-04143",
"Source": "BDU"
},
{
"RefID": "CVE-2016-10196",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10196",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9899",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9899",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5429",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5429",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5430",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5430",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5432",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5432",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5433",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5433",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5434",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5434",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5435",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5435",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5436",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5436",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5438",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5438",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5439",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5439",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5440",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5440",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5441",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5441",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5442",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5442",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5443",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5443",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5444",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5444",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5445",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5445",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5446",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5446",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5447",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5447",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5448",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5448",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5449",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5449",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5450",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5450",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5451",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5451",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5452",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5452",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5453",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5453",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5454",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5455",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5455",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5456",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5456",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5458",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5458",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5459",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5460",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5462",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5464",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5464",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5465",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5465",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5466",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5466",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5467",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5467",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5468",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5469",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5469",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5470",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5470",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5471",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5471",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5472",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5472",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7749",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7749",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7750",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7750",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7751",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7751",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7752",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7752",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7753",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7753",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7754",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7756",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7757",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7758",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7758",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7759",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7759",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7762",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7762",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7764",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7764",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7771",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7771",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7772",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7772",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7773",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7773",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7774",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7774",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7776",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7776",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7777",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7778",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7778",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7779",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7779",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7780",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7780",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7781",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7781",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7783",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7783",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7784",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7784",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7785",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7785",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7786",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7787",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7787",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7788",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7788",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7789",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7791",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7791",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7792",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7792",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7793",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7793",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7797",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7797",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7798",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7798",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7799",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7799",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7800",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7800",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7801",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7801",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7802",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7802",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7803",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7803",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7806",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7807",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7808",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7809",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7810",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7810",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7811",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7812",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7813",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7813",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7814",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7815",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7815",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7816",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7816",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7818",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7818",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7819",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7819",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7820",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7820",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7821",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7821",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7822",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7822",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7823",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7823",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7824",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7824",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7826",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7826",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7827",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7827",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7828",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7828",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7830",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7831",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7831",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7832",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7832",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7833",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7833",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7834",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7834",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7835",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7837",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7837",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7838",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7838",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7839",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7839",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7840",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7840",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7842",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7842",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7843",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7843",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7844",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7844",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5089",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5089",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5090",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5090",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5091",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5091",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5092",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5092",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5093",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5093",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5094",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5094",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5095",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5097",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5097",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5098",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5098",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5099",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5099",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5100",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5100",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5101",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5101",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5102",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5102",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5103",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5103",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5104",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5104",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5105",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5106",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5106",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5107",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5107",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5108",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5108",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5109",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5109",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5111",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5111",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5112",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5112",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5113",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5113",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5114",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5114",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5115",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5115",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5116",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5116",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5117",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5117",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5118",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5118",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5119",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5119",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5122",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5122",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5124",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5124",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5125",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5125",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5126",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5126",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5127",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5127",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5128",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5128",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5129",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5129",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5130",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5130",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5131",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5131",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5132",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5133",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5134",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5134",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5135",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5135",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5136",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5136",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5137",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5137",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5140",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5140",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5141",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5141",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5142",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5142",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5143",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5143",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5146",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5146",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5147",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5147",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5148",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5150",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5150",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5151",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5151",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5152",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5152",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5153",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5153",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5154",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5155",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5155",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5157",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5157",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5158",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5158",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5159",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5159",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5160",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5163",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5163",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5164",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5164",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5165",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5165",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5166",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5167",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5167",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5168",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5168",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5169",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5169",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5172",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5172",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5173",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5173",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5174",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5174",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5175",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5175",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5176",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5176",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5177",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5177",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5179",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5180",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5180",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5181",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5181",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5182",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5182",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox-esr to version 60.0.1-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00155: Уязвимость интерфейса Fetch API браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00156: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00157: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00158: Уязвимость графической библиотеки ANGLE браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00160: Уязвимость реализации функции защиты от вредоносных сайтов и фишинга Phishing and Malware Protection браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить фишинг-атаки\n\n * BDU:2018-00161: Уязвимость реализации механизма CSP браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществлять межсайтовые сценарные атаки\n\n * BDU:2018-00162: Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00163: Уязвимость компонента Developer Tools браузера Mozilla Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00164: Уязвимость реализации технологии WebSockets браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00165: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00166: Уязвимость функции nsImageLoadingContent::Notify браузера Mozilla Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2018-00167: Уязвимость функции mozilla::dom::ImageDocument::UpdateSizeFromLayout браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00168: Уязвимость функции mozilla::a11y::DocAccessible::PutChildrenBack браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00169: Уязвимость функции mozilla::SVGGeometryFrame::GetCanvasTM() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00170: Уязвимость браузера Mozilla Firefox ESR, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2018-00171: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками в реализации SOP (Same-origin policy), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00172: Уязвимость механизма AppCache браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществить подмену домена\n\n * BDU:2018-00173: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00174: Уязвимость реализации протокола «data:» браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации\n\n * BDU:2018-00175: Уязвимость реализации механизма CSP (Content Security Policy) браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00176: Уязвимость браузера Mozilla Firefox ESR, связанная с ошибками при работе с памятью, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00862: Уязвимость функции DoCrypt интерфейса WebCrypto браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2018-00864: Уязвимость режима чтения Reader View браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00865: Уязвимость отображения страницы Activity Stream браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00866: Уязвимость расширения WebExtensions браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2018-00867: Уязвимость браузера Mozilla Firefox, связанная с ошибкой аунтефикации при HTTP запросе, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00868: Уязвимость браузера Mozilla Firefox, связанная с ошибками реализации хранилища файлов cookies, позволяющая нарушителю получить доступ к файлам cookies с атрибутом HttpOnly\n\n * BDU:2018-00869: Уязвимость функции browser.identity.launchWebAuthFlow расширения WebExtensions браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00870: Уязвимость панели инструментов браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00871: Уязвимость браузера Mozilla Firefox, связанная с недостаточной проверкой URI-адреса при его «перетаскивании» в адресную строку браузера из содержимого текущей страницы, позволяющая нарушителю проводить фишинг-атаки\n\n * BDU:2018-00873: Уязвимость браузера Mozilla Firefox, связанная с недостатком в механизме подтверждения источника, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00874: Уязвимость браузера Mozilla Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00875: Уязвимость механизма печати браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00876: Уязвимость реализации редактора стилей компонента Developer Tools браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2018-00877: Уязвимость расширения WebExtensions браузера Mozilla Firefox, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2018-00878: Уязвимость компонента WebAssembly браузера Mozilla Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00879: Уязвимость компонента WebAssembly браузера Mozilla Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00880: Уязвимость реализации механизма Web Worker браузера Mozilla Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01494: Уязвимость мультимедийной библиотеки libvorbis, связанная с выходом за границы при чтении буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или нарушить конфиденциальность и целостность данных\n\n * BDU:2019-00228: Уязвимость функции lz4::decompress библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-00229: Уязвимость graphite2::Silf::readGraphite библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-00230: Уязвимость функции lz4::decompress библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03307: Уязвимость компонента WebSocket браузера Firefox, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03308: Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-03309: Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-03310: Уязвимость компонента PDF Viewer браузеров Firefox ESR и Firefox, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-03311: Уязвимость компонента PDF Viewer браузеров Firefox ESR и Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03312: Уязвимость библиотеки Skia браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03313: Уязвимость функции WrappedI420Buffer компонента WebRTC браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03314: Уязвимость браузера Firefox ESR, связанная с ошибками управления привилегиями, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2019-03315: Уязвимость компонента Content Security Policy (CSP) браузера Firefox ESR, позволяющая нарушителю осуществлять межсайтовые сценарные атаки\n\n * BDU:2019-03316: Уязвимость параметра «Enable Adobe Flash protected mode» плагина Adobe Flash браузера Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2019-03317: Уязвимость кросс-браузерной системы для разработки дополнений WebExtensions браузера Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2019-03318: Уязвимость веб-консоли и JavaScript-отладчика браузера Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-03416: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03417: Уязвимость веб-браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03418: Уязвимость кросс-браузерной системы для разработки дополнений WebExtensions веб-браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-03510: Уязвимость компонента baseURI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации\n\n * BDU:2019-03511: Уязвимость браузера Firefox, связанная с ошибками при перетаскивании ярлыка «Home», позволяющая нарушителю оказать влияние на целостность защищаемой информации\n\n * BDU:2019-03512: Уязвимость браузера Firefox, вызванная возможностью запуска скрипта из буфера обмена на странице Live Bookmarks или в средствах просмотра PDF-файлов, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03513: Уязвимость браузера Firefox, вызванная ошибками отображения символов в именах файлов во вкладке «Загрузки», позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-03514: Уязвимость компонента baseURI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации\n\n * BDU:2019-03515: Уязвимость компонента Content Security Policy (CSP) браузера Firefox, позволяющая нарушителю осуществлять межсайтовые сценарные атаки\n\n * BDU:2019-03516: Уязвимость средства просмотра JSON файлов JSON Viewer браузера Firefox, позволяющая нарушителю осуществлять межсайтовые сценарные атаки\n\n * BDU:2019-03517: Уязвимость реализации языка преобразования XML-документов XSLT браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03518: Уязвимость компонента WebGL браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03519: Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2019-04383: Уязвимость скрипта ServiceWorker браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04697: Уязвимость веб-браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05740: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-05741: Уязвимость функций анимации SMIL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05742: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при обработке транзакций в редакторе, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05743: Уязвимость функции FeatureRef::applyValToFeature библиотеки шрифтов Graphite 2 браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05744: Уязвимость функции nsAutoPtr браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05745: Уязвимость функции nsTArray Length() браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05746: Уязвимость функции txExecutionState браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05747: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05748: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при манипулировании элементами DOM, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05793: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-05801: Уязвимость функции evutil_parse_sockaddr_port (evutil.c) библиотеки асинхронного уведомления событий Libevent, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05803: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05804: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05833: Уязвимость реализации метода ProcessNextState (netwerk\\streamconv\\converters\\nsBinHexDecoder.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05834: Уязвимость реализации метода nsDirIndexParser::ParseData (netwerk\\streamconv\\converters\\nsDirIndexParser.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2020-05842: Уязвимость реализации метода nsDirIndexParser::ParseFormat (netwerk\\streamconv\\converters\\nsDirIndexParser.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c отсутствием проверки при индексировании по массиву, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2020-05843: Уязвимость реализации технологии HTTP/2 браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05844: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05845: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05846: Уязвимость механизма подмены адресной строки через взаимодействие пользователя с адресной строкой и событием «onblur» браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2020-05847: Уязвимость функции PFileSystemRequestConstructor браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c обходом защиты доступа к файловой системе в песочнице, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2020-05848: Уязвимость компонента WebGL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00020: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00021: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00022: Уязвимость библиотеки Skia браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00023: Уязвимость интерфейса Resource Timing API браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00024: Уязвимость реализации объекта «PressShell» браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00026: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при манипулировании элементами DOM, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00028: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная cо смешением символов из блока «Canadian Syllabics» с символами из других блоков, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-00029: Уязвимость аудиокодека Opus браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00030: Уязвимость интерфейса прикладного программирования клиентского хранилища IndexedDB браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00031: Уязвимость компонента XMLHttpRequest браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00032: Уязвимость компонента WebGL (Web-based Graphics Library) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-00033: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00034: Уязвимость загрузчика фреймов браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00035: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00036: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00037: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выход операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2021-00038: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c непринятием мер по защите структуры веб-страницы, позволяющая нарушителю нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00039: Уязвимость реализации функции ConvolvePixel() браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2021-00041: Уязвимость редактора метода ввода Input Method Editor (IME) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00042: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00043: Уязвимость графической библиотеки Skia браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00044: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00045: Уязвимость реализации механизма Strict Transport Security (HSTS) браузера Mozilla Firefox, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-00047: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти при манипуляции с деревом доступа DOM, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00048: Уязвимость службы сетевой безопасности NSS браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность данных\n\n * BDU:2021-00049: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при преобразований XSL, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00050: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00051: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00066: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождениям при манипулировании медиа-элементами HTML, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2021-00067: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождениям, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2021-00068: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность информации\n\n * BDU:2021-00069: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2021-00118: Уязвимость реализации механизма CSP (Content Security Policy) браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00119: Уязвимость браузера Mozilla Firefox, связанная с использованием области памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00120: Уязвимость реализации механизма WebRTC (Web Real Time Communications) браузера Mozilla Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00121: Уязвимость браузера Firefox, связанная с отсутствием одинаковой защиты для интернирования имен заголовков ответов, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00122: Уязвимость браузера Mozilla Firefox, связанная с ошибкой наследования политики безопасности содержимого, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2021-00177: Уязвимость реализации режима AES-GCM интерфейса WebCrypto API браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00178: Уязвимость оператора «instanceof» браузера Mozilla Firefox, позволяющая нарушителю оказать влияние на целостность данных\n\n * BDU:2021-00179: Уязвимость модуля WebExtensions браузера Mozilla Firefox, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-00180: Уязвимость модуля WebExtensions браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00181: Уязвимость протокола «data:» браузера Mozilla Firefox, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-00182: Уязвимость синтаксического анализатора JavaScript браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2021-00183: Уязвимость браузера Mozilla Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00184: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00209: Уязвимость реализации языка разметки SVG браузера Mozilla Firefox, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-00213: Уязвимость браузера Mozilla Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00214: Уязвимость браузера Mozilla Firefox, связанная с недостатком механизма проверки вводимых данных в адресной строке, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-00215: Уязвимость реализации механизма CSP (Content Security Policy браузера Mozilla Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00216: Уязвимость браузера Mozilla Firefox, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-00217: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00218: Уязвимость механизма _exposedProps_ браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00233: Уязвимость реализации метода преобразования последовательностей Punycode браузера Mozilla Firefox, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-00234: Уязвимость браузера Mozilla Firefox, связанная с игнорированием ведущих символов javascript в адресной строке, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00235: Уязвимость браузера Mozilla Firefox, связанная с недостатками используемых мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00236: Уязвимость реализации политики Referrer Policy браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00354: Уязвимость реализации конфигурации app.support.baseURL браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00355: Уязвимость загрузки расширений браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00356: Уязвимость расширения WebExtensions браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00357: Уязвимость реализации протокола «moz-icon:» браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00360: Уязвимость функции browser.tabs.executeScript () расширения WebExtensions браузера Mozilla Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00362: Уязвимость браузера Mozilla Firefox, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00374: Уязвимость реализации технологии WebRTC браузеров Mozilla Firefox и Firefox-ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00375: Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием проверки параметров в IPC-сообщениях, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-00378: Уязвимость реализации функции fetch () интерфейса для получения ресурсов Fetch API браузеров Mozilla Firefox и Firefox-ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00379: Уязвимость браузера Mozilla Firefox, связанная с использованием области памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00380: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-00390: Уязвимость браузера Mozilla Firefox, связанная с использованием области памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00391: Уязвимость функции IsPotentialScrollable браузера Mozilla Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00392: Уязвимость реализации свойства animatedPathSegList языка разметки SVG браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00396: Уязвимость реализации технологии передачи потоковых данных WebRTC браузеров Mozilla Firefox и Firefox-ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00397: Уязвимость API поиска расширения WebExtensions браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00417: Уязвимость интерфейса для поддержки потокового аудио и видео данных Media Capture и Streams API браузера Mozilla Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00426: Уязвимость реализации языка программирования JavaScript браузера Mozilla Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00427: Уязвимость интерфейса push уведомлений Push API браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2021-00501: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04143: Уязвимость браузеров Mozilla Firefox, Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2016-10196: Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.\n\n * CVE-2016-9899: Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox \u003c 50.1, Firefox ESR \u003c 45.6, and Thunderbird \u003c 45.6.\n\n * CVE-2017-5429: Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5430: Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5432: A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5433: A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5434: A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5435: A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5436: An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5438: A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5439: A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5440: A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5441: A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5442: A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5443: An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5444: A buffer overflow vulnerability while parsing \"application/http-index-format\" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5445: A vulnerability while parsing \"application/http-index-format\" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5446: An out-of-bounds read when an HTTP/2 connection to a servers sends \"DATA\" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5447: An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5448: An out-of-bounds write in \"ClearKeyDecryptor\" while decrypting some Clearkey-encrypted media content. The \"ClearKeyDecryptor\" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5449: A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5450: A mechanism to spoof the Firefox for Android addressbar using a \"javascript:\" URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed site and showing an incorrect domain in appended notifications. This vulnerability affects Firefox \u003c 53.\n\n * CVE-2017-5451: A mechanism to spoof the addressbar through the user interaction on the addressbar and the \"onblur\" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5452: Malicious sites can display a spoofed addressbar on a page when the existing location bar on the new page is scrolled out of view if an HTML editable page element is user selected. Note: This attack only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox \u003c 53.\n\n * CVE-2017-5453: A mechanism to inject static HTML into the RSS reader preview page due to a failure to escape characters sent as URL parameters for a feed's \"TITLE\" element. This vulnerability allows for spoofing but no scripted content can be run. This vulnerability affects Firefox \u003c 53.\n\n * CVE-2017-5454: A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5455: The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR \u003c 52.1 and Firefox \u003c 53.\n\n * CVE-2017-5456: A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR \u003c 52.1 and Firefox \u003c 53.\n\n * CVE-2017-5458: When a \"javascript:\" URL is drag and dropped by a user into the addressbar, the URL will be processed and executed. This allows for users to be socially engineered to execute an XSS attack on themselves. This vulnerability affects Firefox \u003c 53.\n\n * CVE-2017-5459: A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5460: A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5462: A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5464: During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5465: An out-of-bounds read while processing SVG content in \"ConvolvePixel\". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5466: If a page is loaded from an original site through a hyperlink and contains a redirect to a \"data:text/html\" URL, triggering a reload will run the reloaded \"data:text/html\" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5467: A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5468: An issue with incorrect ownership model of \"privateBrowsing\" information exposed through developer tools. This can result in a non-exploitable crash when manually triggered during debugging. This vulnerability affects Firefox \u003c 53.\n\n * CVE-2017-5469: Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird \u003c 52.1, Firefox ESR \u003c 45.9, Firefox ESR \u003c 52.1, and Firefox \u003c 53.\n\n * CVE-2017-5470: Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-5471: Memory safety bugs were reported in Firefox 53. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 54.\n\n * CVE-2017-5472: A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7749: A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7750: A use-after-free vulnerability during video control operations when a \"\u003ctrack\u003e\" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7751: A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7752: A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7753: An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7754: An out-of-bounds read in WebGL with a maliciously crafted \"ImageInfo\" object during WebGL operations. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7756: A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7757: A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7758: An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7759: Android intent URLs given to Firefox for Android can be used to navigate from HTTP or HTTPS URLs to local \"file:\" URLs, allowing for the reading of local data through a violation of same-origin policy. Note: This attack only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox \u003c 54.\n\n * CVE-2017-7762: When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox \u003c 54.\n\n * CVE-2017-7764: Characters from the \"Canadian Syllabics\" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw \"punycode\" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from \"Aspirational Use Scripts\" such as Canadian Syllabics to be mixed with Latin characters in the \"moderately restrictive\" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as \"Limited Use Scripts.\". This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7771: Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Pass::readPass function.\n\n * CVE-2017-7772: Heap-based Buffer Overflow in Graphite2 library in Firefox before 54 in lz4::decompress function.\n\n * CVE-2017-7773: Heap-based Buffer Overflow write in Graphite2 library in Firefox before 54 in lz4::decompress src/Decompressor.\n\n * CVE-2017-7774: Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Silf::readGraphite function.\n\n * CVE-2017-7776: Heap-based Buffer Overflow read in Graphite2 library in Firefox before 54 in graphite2::Silf::getClassGlyph.\n\n * CVE-2017-7777: Use of uninitialized memory in Graphite2 library in Firefox before 54 in graphite2::GlyphCache::Loader::read_glyph function.\n\n * CVE-2017-7778: A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox \u003c 54, Firefox ESR \u003c 52.2, and Thunderbird \u003c 52.2.\n\n * CVE-2017-7779: Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7780: Memory safety bugs were reported in Firefox 54. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7781: An error occurs in the elliptic curve point addition algorithm that uses mixed Jacobian-affine coordinates where it can yield a result \"POINT_AT_INFINITY\" when it should not. A man-in-the-middle attacker could use this to interfere with a connection, resulting in an attacked party computing an incorrect shared secret. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7783: If a long user name is used in a username/password combination in a site URL (such as \" http://UserName:Password@example.com\"), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7784: A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7785: A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7786: A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7787: Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7788: When an \"iframe\" has a \"sandbox\" attribute and its content is specified using \"srcdoc\", that content does not inherit the containing page's Content Security Policy (CSP) as it should unless the sandbox attribute included \"allow-same-origin\". This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7789: If a server sends two Strict-Transport-Security (STS) headers for a single connection, they will be rejected as invalid and HTTP Strict Transport Security (HSTS) will not be enabled for the connection. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7791: On pages containing an iframe, the \"data:\" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7792: A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7793: A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7797: Response header name interning does not have same-origin protections and these headers are stored in a global registry. This allows stored header names to be available cross-origin. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7798: The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR \u003c 52.3 and Firefox \u003c 55.\n\n * CVE-2017-7799: JavaScript in the \"about:webrtc\" page is not sanitized properly being assigned to \"innerHTML\". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7800: A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7801: A use-after-free vulnerability can occur while re-computing layout for a \"marquee\" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7802: A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7803: When a page's content security policy (CSP) header contains a \"sandbox\" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7806: A use-after-free vulnerability can occur when the layer manager is freed too early when rendering specific SVG content, resulting in a potentially exploitable crash. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7807: A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7808: A content security policy (CSP) \"frame-ancestors\" directive containing origins with paths allows for comparisons against those paths instead of the origin. This results in a cross-origin information leak of this path information. This vulnerability affects Firefox \u003c 55.\n\n * CVE-2017-7809: A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.3, Firefox ESR \u003c 52.3, and Firefox \u003c 55.\n\n * CVE-2017-7810: Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7811: Memory safety bugs were reported in Firefox 55. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7812: If web content on a page is dragged onto portions of the browser UI, such as the tab bar, links can be opened that otherwise would not be allowed to open. This can allow malicious web content to open a locally stored file through \"file:\" URLs. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7813: Inside the JavaScript parser, a cast of an integer to a narrower type can result in data read from outside the buffer being parsed. This usually results in a non-exploitable crash, but can leak a limited amount of information from memory if it matches JavaScript identifier syntax. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7814: File downloads encoded with \"blob:\" and \"data:\" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7815: On pages containing an iframe, the \"data:\" protocol can be used to create a modal dialog through Javascript that will have an arbitrary domains as the dialog's location, spoofing of the origin of the modal dialog from the user view. Note: This attack only affects installations with e10 multiprocess turned off. Installations with e10s turned on do not support the modal dialog functionality. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7816: WebExtensions could use popups and panels in the extension UI to load an \"about:\" privileged URL, violating security checks that disallow this behavior. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7818: A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7819: A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7820: The \"instanceof\" operator can bypass the Xray wrapper mechanism. When called on web content from the browser itself or an extension the web content can provide its own result for that operator, possibly tricking the browser or extension into mishandling the element. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7821: A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7822: The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox \u003c 56.\n\n * CVE-2017-7823: The content security policy (CSP) \"sandbox\" directive did not create a unique origin for the document, causing it to behave as if the \"allow-same-origin\" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7824: A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.\n\n * CVE-2017-7826: Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 57, Firefox ESR \u003c 52.5, and Thunderbird \u003c 52.5.\n\n * CVE-2017-7827: Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7828: A use-after-free vulnerability can occur when flushing and resizing layout because the \"PressShell\" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox \u003c 57, Firefox ESR \u003c 52.5, and Thunderbird \u003c 52.5.\n\n * CVE-2017-7830: The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox \u003c 57, Firefox ESR \u003c 52.5, and Thunderbird \u003c 52.5.\n\n * CVE-2017-7831: A vulnerability where the security wrapper does not deny access to some exposed properties using the deprecated \"_exposedProps_\" mechanism on proxy objects. These properties should be explicitly unavailable to proxy objects. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7832: The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7833: Some Arabic and Indic vowel marker characters can be combined with Latin characters in a domain name to eclipse the non-Latin character with some font sets on the addressbar. The non-Latin character will not be visible to most viewers. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7834: A \"data:\" URL loaded in a new tab did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when \"data:\" documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7835: Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7837: SVG loaded through \"\u003cimg\u003e\" tags can use \"\u003cmeta\u003e\" tags within the SVG data to set cookies for that page. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7838: Punycode format text will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7839: Control characters prepended before \"javascript:\" URLs pasted in the addressbar can cause the leading characters to be ignored and the pasted JavaScript to be executed instead of being blocked. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks where users are convinced to copy and paste text into the addressbar. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7840: JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7842: If a document's Referrer Policy attribute is set to \"no-referrer\" sometimes two network requests are made for \"\u003clink\u003e\" elements instead of one. One of these requests includes the referrer instead of respecting the set policy to not include a referrer on requests. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7843: When Private Browsing mode is used, it is possible for a web worker to write persistent data to IndexedDB and fingerprint a user uniquely. IndexedDB should not be available in Private Browsing mode and this stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting. This vulnerability affects Firefox ESR \u003c 52.5.2 and Firefox \u003c 57.0.1.\n\n * CVE-2017-7844: A combination of an external SVG image referenced on a page and the coloring of anchor links stored within this image can be used to determine which pages a user has in their history. This can allow a malicious website to query user history. Note: This issue only affects Firefox 57. Earlier releases are not affected. This vulnerability affects Firefox \u003c 57.0.1.\n\n * CVE-2018-5089: Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5090: Memory safety bugs were reported in Firefox 57. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5091: A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 52.6 and Firefox \u003c 58.\n\n * CVE-2018-5092: A use-after-free vulnerability can occur when the thread for a Web Worker is freed from memory prematurely instead of from memory in the main thread while cancelling fetch operations. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5093: A heap buffer overflow vulnerability may occur in WebAssembly during Memory/Table resizing, resulting in a potentially exploitable crash. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5094: A heap buffer overflow vulnerability may occur in WebAssembly when \"shrinkElements\" is called followed by garbage collection on memory that is now uninitialized. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5095: An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5097: A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5098: A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5099: A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5100: A use-after-free vulnerability can occur when arguments passed to the \"IsPotentiallyScrollable\" function are freed while still in use by scripts. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5101: A use-after-free vulnerability can occur when manipulating floating \"first-letter\" style elements, resulting in a potentially exploitable crash. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5102: A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5103: A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5104: A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5105: WebExtensions can bypass user prompts to first save and then open an arbitrarily downloaded file. This can result in an executable file running with local user privileges without explicit user consent. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5106: Style editor traffic in the Developer Tools can be routed through a service worker hosted on a third party website if a user selects error links when these tools are open. This can allow style editor information used within Developer Tools to leak cross-origin. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5107: The printing process can bypass local access protections to read files available through symlinks, bypassing local file restrictions. The printing process requires files in a specific format so arbitrary data cannot be read but it is possible that some local file information could be exposed. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5108: A Blob URL can violate origin attribute segregation, allowing it to be accessed from a private browsing tab and for data to be passed between the private browsing tab and a normal tab. This could allow for the leaking of private information specific to the private browsing context. This issue is mitigated by the requirement that the user enter the Blob URL manually in order for the access violation to occur. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5109: An audio capture session can started under an incorrect origin from the site making the capture request. Users are still prompted to allow the request but the prompt can display the wrong origin, leading to user confusion about which site is making the request to capture an audio stream. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5111: When the text of a specially formatted URL is dragged to the addressbar from page content, the displayed URL can be spoofed to show a different site than the one loaded. This allows for phishing attacks where a malicious page can spoof the identify of another site. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5112: Development Tools panels of an extension are required to load URLs for the panels as relative URLs from the extension manifest file but this requirement was not enforced in all instances. This could allow the development tools panel for the extension to load a URL that it should not be able to access, including potentially privileged pages. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5113: The \"browser.identity.launchWebAuthFlow\" function of WebExtensions is only allowed to load content over \"https:\" but this requirement was not properly enforced. This can potentially allow privileged pages to be loaded by the extension. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5114: If an existing cookie is changed to be \"HttpOnly\" while a document is open, the original value remains accessible through script until that document is closed. Network requests correctly use the changed HttpOnly cookie. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5115: If an HTTP authentication prompt is triggered by a background network request from a page or extension, it is displayed over the currently loaded foreground page. Although the prompt contains the real domain making the request, this can result in user confusion about the originating site of the authentication request and may cause users to mistakenly send private credential information to a third party site. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5116: WebExtensions with the \"ActiveTab\" permission are able to access frames hosted within the active tab even if the frames are cross-origin. Malicious extensions can inject frames from arbitrary origins into the loaded page and then interact with them, bypassing same-origin user expectations with this permission. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5117: If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird \u003c 52.6, Firefox ESR \u003c 52.6, and Firefox \u003c 58.\n\n * CVE-2018-5118: The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through \"file:\" URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5119: The reader view will display cross-origin content when CORS headers are set to prohibit the loading of cross-origin content by a site. This could allow access to content that should be restricted in reader view. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5122: A potential integer overflow in the \"DoCrypt\" function of WebCrypto was identified. If a means was found of exploiting it, it could result in an out-of-bounds write. This vulnerability affects Firefox \u003c 58.\n\n * CVE-2018-5124: Unsanitized output in the browser UI leaves HTML tags in place and can result in arbitrary code execution in Firefox before version 58.0.1.\n\n * CVE-2018-5125: Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.7, Firefox ESR \u003c 52.7, and Firefox \u003c 59.\n\n * CVE-2018-5126: Memory safety bugs were reported in Firefox 58. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5127: A buffer overflow can occur when manipulating the SVG \"animatedPathSegList\" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.7, Firefox ESR \u003c 52.7, and Firefox \u003c 59.\n\n * CVE-2018-5128: A use-after-free vulnerability can occur when manipulating elements, events, and selection ranges during editor operations. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5129: A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird \u003c 52.7, Firefox ESR \u003c 52.7, and Firefox \u003c 59.\n\n * CVE-2018-5130: When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR \u003c 52.7 and Firefox \u003c 59.\n\n * CVE-2018-5131: Under certain circumstances the \"fetch()\" API can return transient local copies of resources that were sent with a \"no-store\" or \"no-cache\" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR \u003c 52.7 and Firefox \u003c 59.\n\n * CVE-2018-5132: The Find API for WebExtensions can search some privileged pages, such as \"about:debugging\", if these pages are open in a tab. This could allow a malicious WebExtension to search for otherwise protected data if a user has it open. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5133: If the \"app.support.baseURL\" preference is changed by a malicious local program to contain HTML and script content, this content is not sanitized. It will be executed if a user loads \"chrome://browser/content/preferences/in-content/preferences.xul\" directly in a tab and executes a search. This stored preference is also executed whenever an EME video player plugin displays a CDM-disabled message as a notification message. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5134: WebExtensions may use \"view-source:\" URLs to view local \"file:\" URL content, as well as content stored in \"about:cache\", bypassing restrictions that only allow WebExtensions to view specific content. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5135: WebExtensions can bypass normal restrictions in some circumstances and use \"browser.tabs.executeScript\" to inject scripts into contexts where this should not be allowed, such as pages from other WebExtensions or unprivileged \"about:\" pages. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5136: A shared worker created from a \"data:\" URL in one tab can be shared by another tab with a different origin, bypassing the same-origin policy. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5137: A legacy extension's non-contentaccessible, defined resources can be loaded by an arbitrary web page through script. This script does this by using a maliciously crafted path string to reference the resources. Note: this vulnerability does not affect WebExtensions. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5140: Image for moz-icons can be accessed through the \"moz-icon:\" protocol through script in web content even when otherwise prohibited. This could allow for information leakage of which applications are associated with specific MIME types by a malicious page. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5141: A vulnerability in the notifications Push API where notifications can be sent through service workers by web content without direct user interaction. This could be used to open new tabs in a denial of service (DOS) attack or to display unwanted content from arbitrary URLs to users. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5142: If Media Capture and Streams API permission is requested from documents with \"data:\" or \"blob:\" URLs, the permission notifications do not properly display the originating domain. The notification states \"Unknown protocol\" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5143: URLs using \"javascript:\" have the protocol removed when pasted into the addressbar to protect users from cross-site scripting (XSS) attacks, but if a tab character is embedded in the \"javascript:\" URL the protocol is not removed and the script will execute. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Firefox \u003c 59.\n\n * CVE-2018-5146: An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox \u003c 59.0.1, Firefox ESR \u003c 52.7.2, and Thunderbird \u003c 52.7.\n\n * CVE-2018-5147: The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms. This vulnerability affects Firefox ESR \u003c 52.7.2 and Firefox \u003c 59.0.1.\n\n * CVE-2018-5148: A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 52.7.3 and Firefox \u003c 59.0.2.\n\n * CVE-2018-5150: Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 52.8, Thunderbird ESR \u003c 52.8, Firefox \u003c 60, and Firefox ESR \u003c 52.8.\n\n * CVE-2018-5151: Memory safety bugs were reported in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5152: WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the \"webRequest\" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5153: If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5154: A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.8, Thunderbird ESR \u003c 52.8, Firefox \u003c 60, and Firefox ESR \u003c 52.8.\n\n * CVE-2018-5155: A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 52.8, Thunderbird ESR \u003c 52.8, Firefox \u003c 60, and Firefox ESR \u003c 52.8.\n\n * CVE-2018-5157: Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR \u003c 52.8 and Firefox \u003c 60.\n\n * CVE-2018-5158: The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR \u003c 52.8 and Firefox \u003c 60.\n\n * CVE-2018-5159: An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird \u003c 52.8, Thunderbird ESR \u003c 52.8, Firefox \u003c 60, and Firefox ESR \u003c 52.8.\n\n * CVE-2018-5160: WebRTC can use a \"WrappedI420Buffer\" pixel buffer but the owning image object can be freed while it is still in use. This can result in the WebRTC encoder using uninitialized memory, leading to a potentially exploitable crash. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5163: If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5164: Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the \"multipart/x-mixed-replace\" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and other attacks. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5165: In 32-bit versions of Firefox, the Adobe Flash plugin setting for \"Enable Adobe Flash protected mode\" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting in user confusion. This could cause users to select this setting intending to activate it and inadvertently turn protections off. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5166: WebExtensions can use request redirection and a \"filterReponseData\" filter to bypass host permission settings to redirect network traffic and access content from a host for which they do not have explicit user permission. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5167: The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display \"chrome:\" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display \"javascript:\" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5168: Sites can bypass security checks on permissions to install lightweight themes by manipulating the \"baseURI\" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird \u003c 52.8, Thunderbird ESR \u003c 52.8, Firefox \u003c 60, and Firefox ESR \u003c 52.8.\n\n * CVE-2018-5169: If manipulated hyperlinked text with \"chrome:\" URL contained in it is dragged and dropped on the \"home\" icon, the home page can be reset to include a normally-unlinkable chrome page as one of the home page tabs. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5172: The Live Bookmarks page and the PDF viewer can run injected script content if a user pastes script from the clipboard into them while viewing RSS feeds or PDF files. This could allow a malicious site to socially engineer a user to copy and paste malicious script content that could then run with the context of either page but does not allow for privilege escalation. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5173: The filename appearing in the \"Downloads\" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5174: In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the \"SEE_MASK_FLAG_NO_UI\" flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won't prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems. This vulnerability affects Thunderbird \u003c 52.8, Thunderbird ESR \u003c 52.8, Firefox \u003c 60, and Firefox ESR \u003c 52.8.\n\n * CVE-2018-5175: A mechanism to bypass Content Security Policy (CSP) protections on sites that have a \"script-src\" policy of \"'strict-dynamic'\". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the \"require.js\" library that is part of Firefox's Developer Tools, and then use a known technique using that library to bypass the CSP restrictions on executing injected scripts. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5176: The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including \"javascript:\" links. If a JSON file contains malicious JavaScript script embedded as \"javascript:\" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5177: A vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5179: A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.\n\n * CVE-2018-5180: A use-after-free vulnerability can occur during WebGL operations. While this results in a potentially exploitable crash, the vulnerability is limited because the memory is freed and reused in a brief window of time during the freeing of the same callstack. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5181: If a URL using the \"file:\" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the \"noopener\" keyword. This vulnerability affects Firefox \u003c 60.\n\n * CVE-2018-5182: If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent \"file:\" URL. This vulnerability affects Firefox \u003c 60.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-06-05"
},
"Updated": {
"Date": "2018-06-05"
},
"BDUs": [
{
"ID": "BDU:2018-00155",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00155",
"Impact": "High",
"Public": "20170609"
},
{
"ID": "BDU:2018-00156",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00156",
"Impact": "High",
"Public": "20170510"
},
{
"ID": "BDU:2018-00157",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00157",
"Impact": "High",
"Public": "20170712"
},
{
"ID": "BDU:2018-00158",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-120",
"Href": "https://bdu.fstec.ru/vul/2018-00158",
"Impact": "High",
"Public": "20170908"
},
{
"ID": "BDU:2018-00160",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-494",
"Href": "https://bdu.fstec.ru/vul/2018-00160",
"Impact": "High",
"Public": "20170623"
},
{
"ID": "BDU:2018-00161",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2018-00161",
"Impact": "High",
"Public": "20170902"
},
{
"ID": "BDU:2018-00162",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-120, CWE-121, CWE-122, CWE-415",
"Href": "https://bdu.fstec.ru/vul/2018-00162",
"Impact": "High",
"Public": "20170806"
},
{
"ID": "BDU:2018-00163",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-77, CWE-94",
"Href": "https://bdu.fstec.ru/vul/2018-00163",
"Impact": "High",
"Public": "20170609"
},
{
"ID": "BDU:2018-00164",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00164",
"Impact": "High",
"Public": "20170618"
},
{
"ID": "BDU:2018-00165",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00165",
"Impact": "High",
"Public": "20170608"
},
{
"ID": "BDU:2018-00166",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00166",
"Impact": "High",
"Public": "20170808"
},
{
"ID": "BDU:2018-00167",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00167",
"Impact": "High",
"Public": "20170704"
},
{
"ID": "BDU:2018-00168",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00168",
"Impact": "High",
"Public": "20170417"
},
{
"ID": "BDU:2018-00169",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-125",
"Href": "https://bdu.fstec.ru/vul/2018-00169",
"Impact": "High",
"Public": "20170516"
},
{
"ID": "BDU:2018-00170",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00170",
"Impact": "High",
"Public": "20170808"
},
{
"ID": "BDU:2018-00171",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00171",
"Impact": "High",
"Public": "20161211"
},
{
"ID": "BDU:2018-00172",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2018-00172",
"Impact": "High",
"Public": "20170627"
},
{
"ID": "BDU:2018-00173",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00173",
"Impact": "High",
"Public": "20170530"
},
{
"ID": "BDU:2018-00174",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2018-00174",
"Impact": "High",
"Public": "20170518"
},
{
"ID": "BDU:2018-00175",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2018-00175",
"Impact": "High",
"Public": "20170630"
},
{
"ID": "BDU:2018-00176",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-415",
"Href": "https://bdu.fstec.ru/vul/2018-00176",
"Impact": "High",
"Public": "20170808"
},
{
"ID": "BDU:2018-00862",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2018-00862",
"Impact": "Critical",
"Public": "20171102"
},
{
"ID": "BDU:2018-00864",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00864",
"Impact": "Low",
"Public": "20171124"
},
{
"ID": "BDU:2018-00865",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00865",
"Impact": "Low",
"Public": "20171122"
},
{
"ID": "BDU:2018-00866",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2018-00866",
"Impact": "Critical",
"Public": "20170903"
},
{
"ID": "BDU:2018-00867",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00867",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "BDU:2018-00868",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00868",
"Impact": "Low",
"Public": "20171128"
},
{
"ID": "BDU:2018-00869",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://bdu.fstec.ru/vul/2018-00869",
"Impact": "High",
"Public": "20171214"
},
{
"ID": "BDU:2018-00870",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-552",
"Href": "https://bdu.fstec.ru/vul/2018-00870",
"Impact": "High",
"Public": "20171214"
},
{
"ID": "BDU:2018-00871",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2018-00871",
"Impact": "Low",
"Public": "20161201"
},
{
"ID": "BDU:2018-00873",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2018-00873",
"Impact": "Low",
"Public": "20171004"
},
{
"ID": "BDU:2018-00874",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00874",
"Impact": "Low",
"Public": "20171127"
},
{
"ID": "BDU:2018-00875",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-59",
"Href": "https://bdu.fstec.ru/vul/2018-00875",
"Impact": "Low",
"Public": "20170707"
},
{
"ID": "BDU:2018-00876",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00876",
"Impact": "Low",
"Public": "20171014"
},
{
"ID": "BDU:2018-00877",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2018-00877",
"Impact": "High",
"Public": "20170816"
},
{
"ID": "BDU:2018-00878",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00878",
"Impact": "High",
"Public": "20171109"
},
{
"ID": "BDU:2018-00879",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00879",
"Impact": "High",
"Public": "20171107"
},
{
"ID": "BDU:2018-00880",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00880",
"Impact": "Critical",
"Public": "20171116"
},
{
"ID": "BDU:2018-01494",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2018-01494",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "BDU:2019-00228",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2019-00228",
"Impact": "Low",
"Public": "20170613"
},
{
"ID": "BDU:2019-00229",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-00229",
"Impact": "Low",
"Public": "20170613"
},
{
"ID": "BDU:2019-00230",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-00230",
"Impact": "Low",
"Public": "20170613"
},
{
"ID": "BDU:2019-03307",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-03307",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "BDU:2019-03308",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03308",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03309",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03309",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03310",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03310",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03311",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://bdu.fstec.ru/vul/2019-03311",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03312",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-03312",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03313",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-03313",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03314",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-03314",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03315",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2019-03315",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "BDU:2019-03316",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-03316",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "BDU:2019-03317",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-266",
"Href": "https://bdu.fstec.ru/vul/2019-03317",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03318",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03318",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "BDU:2019-03416",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-03416",
"Impact": "Critical",
"Public": "20180509"
},
{
"ID": "BDU:2019-03417",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-03417",
"Impact": "High",
"Public": "20180509"
},
{
"ID": "BDU:2019-03418",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03418",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "BDU:2019-03510",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-275",
"Href": "https://bdu.fstec.ru/vul/2019-03510",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03511",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03511",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03512",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-74",
"Href": "https://bdu.fstec.ru/vul/2019-03512",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03513",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03513",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03514",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2019-03514",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03515",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2019-03515",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03516",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03516",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-03517",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-03517",
"Impact": "High",
"Public": "20181106"
},
{
"ID": "BDU:2019-03518",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03518",
"Impact": "High",
"Public": "20181106"
},
{
"ID": "BDU:2019-03519",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03519",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-04383",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2019-04383",
"Impact": "High",
"Public": "20180426"
},
{
"ID": "BDU:2019-04697",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04697",
"Impact": "High",
"Public": "20190509"
},
{
"ID": "BDU:2020-05740",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-05740",
"Impact": "Critical",
"Public": "20171026"
},
{
"ID": "BDU:2020-05741",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05741",
"Impact": "Critical",
"Public": "20170314"
},
{
"ID": "BDU:2020-05742",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05742",
"Impact": "Critical",
"Public": "20170326"
},
{
"ID": "BDU:2020-05743",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-05743",
"Impact": "High",
"Public": "20170308"
},
{
"ID": "BDU:2020-05744",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05744",
"Impact": "Critical",
"Public": "20170205"
},
{
"ID": "BDU:2020-05745",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05745",
"Impact": "Critical",
"Public": "20170205"
},
{
"ID": "BDU:2020-05746",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05746",
"Impact": "Critical",
"Public": "20170205"
},
{
"ID": "BDU:2020-05747",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05747",
"Impact": "Critical",
"Public": "20170302"
},
{
"ID": "BDU:2020-05748",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05748",
"Impact": "Critical",
"Public": "20170316"
},
{
"ID": "BDU:2020-05793",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-05793",
"Impact": "Critical",
"Public": "20171026"
},
{
"ID": "BDU:2020-05801",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-05801",
"Impact": "High",
"Public": "20170228"
},
{
"ID": "BDU:2020-05803",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05803",
"Impact": "Critical",
"Public": "20170312"
},
{
"ID": "BDU:2020-05804",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05804",
"Impact": "Critical",
"Public": "20170323"
},
{
"ID": "BDU:2020-05833",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-05833",
"Impact": "Critical",
"Public": "20170225"
},
{
"ID": "BDU:2020-05834",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-05834",
"Impact": "High",
"Public": "20170304"
},
{
"ID": "BDU:2020-05842",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-129",
"Href": "https://bdu.fstec.ru/vul/2020-05842",
"Impact": "High",
"Public": "20170304"
},
{
"ID": "BDU:2020-05843",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-05843",
"Impact": "Critical",
"Public": "20170301"
},
{
"ID": "BDU:2020-05844",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05844",
"Impact": "Critical",
"Public": "20170301"
},
{
"ID": "BDU:2020-05845",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05845",
"Impact": "High",
"Public": "20170216"
},
{
"ID": "BDU:2020-05846",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05846",
"Impact": "Low",
"Public": "20160517"
},
{
"ID": "BDU:2020-05847",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-05847",
"Impact": "High",
"Public": "20170321"
},
{
"ID": "BDU:2020-05848",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-05848",
"Impact": "Critical",
"Public": "20170125"
},
{
"ID": "BDU:2021-00020",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00020",
"Impact": "Critical",
"Public": "20171113"
},
{
"ID": "BDU:2021-00021",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00021",
"Impact": "Critical",
"Public": "20170913"
},
{
"ID": "BDU:2021-00022",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2021-00022",
"Impact": "Critical",
"Public": "20171117"
},
{
"ID": "BDU:2021-00023",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-87, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00023",
"Impact": "Low",
"Public": "20171016"
},
{
"ID": "BDU:2021-00024",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00024",
"Impact": "Critical",
"Public": "20171027"
},
{
"ID": "BDU:2021-00026",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00026",
"Impact": "Critical",
"Public": "20170712"
},
{
"ID": "BDU:2021-00028",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00028",
"Impact": "Low",
"Public": "20170511"
},
{
"ID": "BDU:2021-00029",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-00029",
"Impact": "Critical",
"Public": "20170529"
},
{
"ID": "BDU:2021-00030",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00030",
"Impact": "Critical",
"Public": "20170415"
},
{
"ID": "BDU:2021-00031",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00031",
"Impact": "Critical",
"Public": "20170521"
},
{
"ID": "BDU:2021-00032",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-00032",
"Impact": "High",
"Public": "20170417"
},
{
"ID": "BDU:2021-00033",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00033",
"Impact": "Critical",
"Public": "20170414"
},
{
"ID": "BDU:2021-00034",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00034",
"Impact": "Critical",
"Public": "20170614"
},
{
"ID": "BDU:2021-00035",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00035",
"Impact": "Critical",
"Public": "20170410"
},
{
"ID": "BDU:2021-00036",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00036",
"Impact": "Critical",
"Public": "20170614"
},
{
"ID": "BDU:2021-00037",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00037",
"Impact": "Critical",
"Public": "20160805"
},
{
"ID": "BDU:2021-00038",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00038",
"Impact": "Low",
"Public": "20170405"
},
{
"ID": "BDU:2021-00039",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-00039",
"Impact": "Critical",
"Public": "20170315"
},
{
"ID": "BDU:2021-00041",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00041",
"Impact": "High",
"Public": "20170425"
},
{
"ID": "BDU:2021-00042",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00042",
"Impact": "Critical",
"Public": "20170509"
},
{
"ID": "BDU:2021-00043",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00043",
"Impact": "High",
"Public": "20170314"
},
{
"ID": "BDU:2021-00044",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00044",
"Impact": "Critical",
"Public": "20170301"
},
{
"ID": "BDU:2021-00045",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-74, CWE-285",
"Href": "https://bdu.fstec.ru/vul/2021-00045",
"Impact": "Low",
"Public": "20140929"
},
{
"ID": "BDU:2021-00047",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00047",
"Impact": "Critical",
"Public": "20170314"
},
{
"ID": "BDU:2021-00048",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-682",
"Href": "https://bdu.fstec.ru/vul/2021-00048",
"Impact": "Low",
"Public": "20170307"
},
{
"ID": "BDU:2021-00049",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00049",
"Impact": "Critical",
"Public": "20170804"
},
{
"ID": "BDU:2021-00050",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00050",
"Impact": "Critical",
"Public": "20180123"
},
{
"ID": "BDU:2021-00051",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00051",
"Impact": "Critical",
"Public": "20171115"
},
{
"ID": "BDU:2021-00066",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00066",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "BDU:2021-00067",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00067",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "BDU:2021-00068",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00068",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "BDU:2021-00069",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00069",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "BDU:2021-00118",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200, CWE-346, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2021-00118",
"Impact": "Low",
"Public": "20170524"
},
{
"ID": "BDU:2021-00119",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00119",
"Impact": "High",
"Public": "20170704"
},
{
"ID": "BDU:2021-00120",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-77, CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00120",
"Impact": "Low",
"Public": "20170613"
},
{
"ID": "BDU:2021-00121",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2021-00121",
"Impact": "High",
"Public": "20170128"
},
{
"ID": "BDU:2021-00122",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-74, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2021-00122",
"Impact": "Critical",
"Public": "20140928"
},
{
"ID": "BDU:2021-00177",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00177",
"Impact": "Low",
"Public": "20170530"
},
{
"ID": "BDU:2021-00178",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00178",
"Impact": "Low",
"Public": "20170704"
},
{
"ID": "BDU:2021-00179",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2021-00179",
"Impact": "Critical",
"Public": "20170311"
},
{
"ID": "BDU:2021-00180",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00180",
"Impact": "Low",
"Public": "20170713"
},
{
"ID": "BDU:2021-00181",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00181",
"Impact": "Low",
"Public": "20170531"
},
{
"ID": "BDU:2021-00182",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-125, CWE-704",
"Href": "https://bdu.fstec.ru/vul/2021-00182",
"Impact": "High",
"Public": "20170724"
},
{
"ID": "BDU:2021-00183",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00183",
"Impact": "Low",
"Public": "20170710"
},
{
"ID": "BDU:2021-00184",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00184",
"Impact": "Critical",
"Public": "20170804"
},
{
"ID": "BDU:2021-00209",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00209",
"Impact": "Low",
"Public": "20161227"
},
{
"ID": "BDU:2021-00213",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00213",
"Impact": "High",
"Public": "20170922"
},
{
"ID": "BDU:2021-00214",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00214",
"Impact": "Low",
"Public": "20170606"
},
{
"ID": "BDU:2021-00215",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00215",
"Impact": "Low",
"Public": "20170419"
},
{
"ID": "BDU:2021-00216",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00216",
"Impact": "Low",
"Public": "20171015"
},
{
"ID": "BDU:2021-00217",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00217",
"Impact": "Critical",
"Public": "20171115"
},
{
"ID": "BDU:2021-00218",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00218",
"Impact": "Low",
"Public": "20170819"
},
{
"ID": "BDU:2021-00233",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00233",
"Impact": "Low",
"Public": "20170913"
},
{
"ID": "BDU:2021-00234",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00234",
"Impact": "Low",
"Public": "20170925"
},
{
"ID": "BDU:2021-00235",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00235",
"Impact": "Low",
"Public": "20170519"
},
{
"ID": "BDU:2021-00236",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00236",
"Impact": "Low",
"Public": "20170906"
},
{
"ID": "BDU:2021-00354",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00354",
"Impact": "Low",
"Public": "20180114"
},
{
"ID": "BDU:2021-00355",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00355",
"Impact": "High",
"Public": "20180124"
},
{
"ID": "BDU:2021-00356",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00356",
"Impact": "High",
"Public": "20180110"
},
{
"ID": "BDU:2021-00357",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00357",
"Impact": "Low",
"Public": "20171208"
},
{
"ID": "BDU:2021-00360",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-862",
"Href": "https://bdu.fstec.ru/vul/2021-00360",
"Impact": "High",
"Public": "20180118"
},
{
"ID": "BDU:2021-00362",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00362",
"Impact": "High",
"Public": "20171120"
},
{
"ID": "BDU:2021-00374",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00374",
"Impact": "Critical",
"Public": "20180123"
},
{
"ID": "BDU:2021-00375",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-00375",
"Impact": "High",
"Public": "20180108"
},
{
"ID": "BDU:2021-00378",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-212",
"Href": "https://bdu.fstec.ru/vul/2021-00378",
"Impact": "Low",
"Public": "20180223"
},
{
"ID": "BDU:2021-00379",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00379",
"Impact": "Critical",
"Public": "20180118"
},
{
"ID": "BDU:2021-00380",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00380",
"Impact": "Critical",
"Public": "20180313"
},
{
"ID": "BDU:2021-00390",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00390",
"Impact": "High",
"Public": "20171115"
},
{
"ID": "BDU:2021-00391",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00391",
"Impact": "High",
"Public": "20171115"
},
{
"ID": "BDU:2021-00392",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00392",
"Impact": "High",
"Public": "20180115"
},
{
"ID": "BDU:2021-00396",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-120",
"Href": "https://bdu.fstec.ru/vul/2021-00396",
"Impact": "High",
"Public": "20180124"
},
{
"ID": "BDU:2021-00397",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-00397",
"Impact": "Low",
"Public": "20171012"
},
{
"ID": "BDU:2021-00417",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00417",
"Impact": "Low",
"Public": "20170519"
},
{
"ID": "BDU:2021-00426",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00426",
"Impact": "Low",
"Public": "20171203"
},
{
"ID": "BDU:2021-00427",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00427",
"Impact": "High",
"Public": "20180109"
},
{
"ID": "BDU:2021-00501",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00501",
"Impact": "Critical",
"Public": "20180123"
},
{
"ID": "BDU:2021-04143",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04143",
"Impact": "Critical",
"Public": "20180611"
}
],
"CVEs": [
{
"ID": "CVE-2016-10196",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10196",
"Impact": "High",
"Public": "20170315"
},
{
"ID": "CVE-2016-9899",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9899",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5429",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5429",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5430",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5430",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5432",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5432",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5433",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5433",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5434",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5434",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5435",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5435",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5436",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5436",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5438",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5438",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5439",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5439",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5440",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5440",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5441",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5441",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5442",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5442",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5443",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5443",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5444",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5444",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5445",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-129",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5445",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5446",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5446",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5447",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5447",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5448",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5448",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5449",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5449",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5450",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5450",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5451",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5451",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5452",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5452",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5453",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5453",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5454",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5454",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5455",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5455",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5456",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5456",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5458",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5458",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5459",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5459",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5460",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5460",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5462",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-682",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5462",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5464",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5464",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5465",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5465",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5466",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5466",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5467",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5467",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-5468",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5468",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5469",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5469",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5470",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5470",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5471",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5471",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5472",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5472",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7749",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7749",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7750",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7750",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7751",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7751",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7752",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7753",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7753",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7754",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7754",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7756",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7756",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7757",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7757",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7758",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7758",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7759",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7759",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7762",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7762",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7764",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7764",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7771",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7771",
"Impact": "High",
"Public": "20190415"
},
{
"ID": "CVE-2017-7772",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7772",
"Impact": "High",
"Public": "20190412"
},
{
"ID": "CVE-2017-7773",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7773",
"Impact": "High",
"Public": "20190415"
},
{
"ID": "CVE-2017-7774",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7774",
"Impact": "Critical",
"Public": "20190415"
},
{
"ID": "CVE-2017-7776",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7776",
"Impact": "High",
"Public": "20190415"
},
{
"ID": "CVE-2017-7777",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7777",
"Impact": "High",
"Public": "20190415"
},
{
"ID": "CVE-2017-7778",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7778",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7779",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7779",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7780",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7780",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7781",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7781",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7783",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7783",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7784",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7784",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7785",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7785",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7786",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7786",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7787",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7787",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7788",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-74",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7788",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7789",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7789",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7791",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7791",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7792",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7792",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7793",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7793",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7797",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7797",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7798",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7798",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7799",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7799",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7800",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7800",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7801",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7801",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7802",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7802",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7803",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7803",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7806",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7806",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7807",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7807",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7808",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7808",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7809",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7809",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7810",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7810",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7811",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7811",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7812",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7812",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7813",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7813",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7814",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7814",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7815",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7815",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7816",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7816",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7818",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7818",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7819",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7819",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7820",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7820",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7821",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7821",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7822",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7822",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7823",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7823",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7824",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7824",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7826",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7826",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7827",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7827",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7828",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7828",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-7830",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7830",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7831",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7831",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7832",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7832",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7833",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7833",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7834",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7834",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7835",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7835",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7837",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7837",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7838",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7838",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7839",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7839",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7840",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7840",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7842",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7842",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7843",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7843",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7844",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7844",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5089",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5089",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5090",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5090",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5091",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5091",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5092",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5092",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5093",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5093",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5094",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5094",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5095",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5095",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5097",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5097",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5098",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5098",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5099",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5099",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5100",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5100",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5101",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5101",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5102",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5102",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5103",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5103",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5104",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5104",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5105",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5105",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5106",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5106",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5107",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5107",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5108",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5108",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5109",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5109",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5111",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5111",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5112",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-552",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5112",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5113",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5113",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5114",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5114",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5115",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5115",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5116",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5116",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5117",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5117",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5118",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5118",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5119",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5119",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5122",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5122",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5124",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5124",
"Impact": "Low",
"Public": "20190426"
},
{
"ID": "CVE-2018-5125",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5125",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5126",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5126",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5127",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5127",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5128",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5128",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5129",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5129",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5130",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5130",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5131",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5131",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5132",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5132",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5133",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5133",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5134",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5134",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5135",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5135",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5136",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5136",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5137",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5137",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5140",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5140",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5141",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5141",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5142",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5142",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5143",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5143",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5146",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5146",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5147",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5147",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5148",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5148",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5150",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5150",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5151",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5151",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5152",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5152",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5153",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5153",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5154",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5154",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5155",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5155",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5157",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5157",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5158",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5158",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5159",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5159",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2018-5160",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5160",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5163",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5163",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5164",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5164",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5165",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5165",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5166",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5166",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5167",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5167",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5168",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5168",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5169",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5169",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5172",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5172",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5173",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5173",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5174",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5174",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5175",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5175",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5176",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5176",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2018-5177",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5177",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5179",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5179",
"Impact": "High",
"Public": "20190426"
},
{
"ID": "CVE-2018-5180",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5180",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5181",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5181",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2018-5182",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5182",
"Impact": "High",
"Public": "20180611"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181854001",
"Comment": "firefox-esr is earlier than 0:60.0.1-alt1"
}
]
}
]
}
}
]
}