vuln-list-alt/oval/p10/ALT-PU-2022-2055/definitions.json
2024-12-12 21:07:30 +00:00

3512 lines
181 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222055",
"Version": "oval:org.altlinux.errata:def:20222055",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2055: package `chromium-gost` update to version 102.0.5005.61-alt0.p10.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2055",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2055",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-04989",
"RefURL": "https://bdu.fstec.ru/vul/2020-04989",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05187",
"RefURL": "https://bdu.fstec.ru/vul/2020-05187",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00703",
"RefURL": "https://bdu.fstec.ru/vul/2022-00703",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00793",
"RefURL": "https://bdu.fstec.ru/vul/2022-00793",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00794",
"RefURL": "https://bdu.fstec.ru/vul/2022-00794",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00795",
"RefURL": "https://bdu.fstec.ru/vul/2022-00795",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00796",
"RefURL": "https://bdu.fstec.ru/vul/2022-00796",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00797",
"RefURL": "https://bdu.fstec.ru/vul/2022-00797",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00798",
"RefURL": "https://bdu.fstec.ru/vul/2022-00798",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00799",
"RefURL": "https://bdu.fstec.ru/vul/2022-00799",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00810",
"RefURL": "https://bdu.fstec.ru/vul/2022-00810",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00812",
"RefURL": "https://bdu.fstec.ru/vul/2022-00812",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00813",
"RefURL": "https://bdu.fstec.ru/vul/2022-00813",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00816",
"RefURL": "https://bdu.fstec.ru/vul/2022-00816",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00817",
"RefURL": "https://bdu.fstec.ru/vul/2022-00817",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00818",
"RefURL": "https://bdu.fstec.ru/vul/2022-00818",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00819",
"RefURL": "https://bdu.fstec.ru/vul/2022-00819",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00844",
"RefURL": "https://bdu.fstec.ru/vul/2022-00844",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00946",
"RefURL": "https://bdu.fstec.ru/vul/2022-00946",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00947",
"RefURL": "https://bdu.fstec.ru/vul/2022-00947",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00955",
"RefURL": "https://bdu.fstec.ru/vul/2022-00955",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00966",
"RefURL": "https://bdu.fstec.ru/vul/2022-00966",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00967",
"RefURL": "https://bdu.fstec.ru/vul/2022-00967",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00968",
"RefURL": "https://bdu.fstec.ru/vul/2022-00968",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00969",
"RefURL": "https://bdu.fstec.ru/vul/2022-00969",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01076",
"RefURL": "https://bdu.fstec.ru/vul/2022-01076",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01077",
"RefURL": "https://bdu.fstec.ru/vul/2022-01077",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01168",
"RefURL": "https://bdu.fstec.ru/vul/2022-01168",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01169",
"RefURL": "https://bdu.fstec.ru/vul/2022-01169",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01170",
"RefURL": "https://bdu.fstec.ru/vul/2022-01170",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01171",
"RefURL": "https://bdu.fstec.ru/vul/2022-01171",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01174",
"RefURL": "https://bdu.fstec.ru/vul/2022-01174",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01230",
"RefURL": "https://bdu.fstec.ru/vul/2022-01230",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01236",
"RefURL": "https://bdu.fstec.ru/vul/2022-01236",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01276",
"RefURL": "https://bdu.fstec.ru/vul/2022-01276",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01277",
"RefURL": "https://bdu.fstec.ru/vul/2022-01277",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01278",
"RefURL": "https://bdu.fstec.ru/vul/2022-01278",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01284",
"RefURL": "https://bdu.fstec.ru/vul/2022-01284",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01288",
"RefURL": "https://bdu.fstec.ru/vul/2022-01288",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01289",
"RefURL": "https://bdu.fstec.ru/vul/2022-01289",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01297",
"RefURL": "https://bdu.fstec.ru/vul/2022-01297",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01321",
"RefURL": "https://bdu.fstec.ru/vul/2022-01321",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01354",
"RefURL": "https://bdu.fstec.ru/vul/2022-01354",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01355",
"RefURL": "https://bdu.fstec.ru/vul/2022-01355",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01365",
"RefURL": "https://bdu.fstec.ru/vul/2022-01365",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01383",
"RefURL": "https://bdu.fstec.ru/vul/2022-01383",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01421",
"RefURL": "https://bdu.fstec.ru/vul/2022-01421",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01423",
"RefURL": "https://bdu.fstec.ru/vul/2022-01423",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01426",
"RefURL": "https://bdu.fstec.ru/vul/2022-01426",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01428",
"RefURL": "https://bdu.fstec.ru/vul/2022-01428",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01471",
"RefURL": "https://bdu.fstec.ru/vul/2022-01471",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01494",
"RefURL": "https://bdu.fstec.ru/vul/2022-01494",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01513",
"RefURL": "https://bdu.fstec.ru/vul/2022-01513",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01514",
"RefURL": "https://bdu.fstec.ru/vul/2022-01514",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01516",
"RefURL": "https://bdu.fstec.ru/vul/2022-01516",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01519",
"RefURL": "https://bdu.fstec.ru/vul/2022-01519",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01904",
"RefURL": "https://bdu.fstec.ru/vul/2022-01904",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01909",
"RefURL": "https://bdu.fstec.ru/vul/2022-01909",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01910",
"RefURL": "https://bdu.fstec.ru/vul/2022-01910",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01911",
"RefURL": "https://bdu.fstec.ru/vul/2022-01911",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01912",
"RefURL": "https://bdu.fstec.ru/vul/2022-01912",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01913",
"RefURL": "https://bdu.fstec.ru/vul/2022-01913",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01917",
"RefURL": "https://bdu.fstec.ru/vul/2022-01917",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01918",
"RefURL": "https://bdu.fstec.ru/vul/2022-01918",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01919",
"RefURL": "https://bdu.fstec.ru/vul/2022-01919",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01920",
"RefURL": "https://bdu.fstec.ru/vul/2022-01920",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01921",
"RefURL": "https://bdu.fstec.ru/vul/2022-01921",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01922",
"RefURL": "https://bdu.fstec.ru/vul/2022-01922",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01939",
"RefURL": "https://bdu.fstec.ru/vul/2022-01939",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01966",
"RefURL": "https://bdu.fstec.ru/vul/2022-01966",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01967",
"RefURL": "https://bdu.fstec.ru/vul/2022-01967",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01968",
"RefURL": "https://bdu.fstec.ru/vul/2022-01968",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01969",
"RefURL": "https://bdu.fstec.ru/vul/2022-01969",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01970",
"RefURL": "https://bdu.fstec.ru/vul/2022-01970",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02115",
"RefURL": "https://bdu.fstec.ru/vul/2022-02115",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02139",
"RefURL": "https://bdu.fstec.ru/vul/2022-02139",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02140",
"RefURL": "https://bdu.fstec.ru/vul/2022-02140",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02176",
"RefURL": "https://bdu.fstec.ru/vul/2022-02176",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02177",
"RefURL": "https://bdu.fstec.ru/vul/2022-02177",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02178",
"RefURL": "https://bdu.fstec.ru/vul/2022-02178",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02179",
"RefURL": "https://bdu.fstec.ru/vul/2022-02179",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02180",
"RefURL": "https://bdu.fstec.ru/vul/2022-02180",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02336",
"RefURL": "https://bdu.fstec.ru/vul/2022-02336",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03186",
"RefURL": "https://bdu.fstec.ru/vul/2022-03186",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03204",
"RefURL": "https://bdu.fstec.ru/vul/2022-03204",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03205",
"RefURL": "https://bdu.fstec.ru/vul/2022-03205",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03272",
"RefURL": "https://bdu.fstec.ru/vul/2022-03272",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03310",
"RefURL": "https://bdu.fstec.ru/vul/2022-03310",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03323",
"RefURL": "https://bdu.fstec.ru/vul/2022-03323",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03325",
"RefURL": "https://bdu.fstec.ru/vul/2022-03325",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03326",
"RefURL": "https://bdu.fstec.ru/vul/2022-03326",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03327",
"RefURL": "https://bdu.fstec.ru/vul/2022-03327",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03329",
"RefURL": "https://bdu.fstec.ru/vul/2022-03329",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03331",
"RefURL": "https://bdu.fstec.ru/vul/2022-03331",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03332",
"RefURL": "https://bdu.fstec.ru/vul/2022-03332",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03347",
"RefURL": "https://bdu.fstec.ru/vul/2022-03347",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03367",
"RefURL": "https://bdu.fstec.ru/vul/2022-03367",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03386",
"RefURL": "https://bdu.fstec.ru/vul/2022-03386",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03824",
"RefURL": "https://bdu.fstec.ru/vul/2022-03824",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03825",
"RefURL": "https://bdu.fstec.ru/vul/2022-03825",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03826",
"RefURL": "https://bdu.fstec.ru/vul/2022-03826",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03827",
"RefURL": "https://bdu.fstec.ru/vul/2022-03827",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03828",
"RefURL": "https://bdu.fstec.ru/vul/2022-03828",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03829",
"RefURL": "https://bdu.fstec.ru/vul/2022-03829",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03830",
"RefURL": "https://bdu.fstec.ru/vul/2022-03830",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03831",
"RefURL": "https://bdu.fstec.ru/vul/2022-03831",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04377",
"RefURL": "https://bdu.fstec.ru/vul/2022-04377",
"Source": "BDU"
},
{
"RefID": "CVE-2022-0452",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0452",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0453",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0453",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0454",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0456",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0456",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0457",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0457",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0458",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0458",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0459",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0460",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0461",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0461",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0462",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0463",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0463",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0464",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0464",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0465",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0465",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0466",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0466",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0467",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0467",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0468",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0469",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0469",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0470",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0470",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0603",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0603",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0604",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0604",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0605",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0605",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0606",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0606",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0607",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0607",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0608",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0609",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0610",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0789",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0790",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0790",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0791",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0791",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0792",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0792",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0793",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0793",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0794",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0794",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0795",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0795",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0796",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0796",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0797",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0797",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0798",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0798",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0799",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0799",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0800",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0800",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0801",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0801",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0802",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0802",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0803",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0803",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0804",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0804",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0805",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0805",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0806",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0807",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0808",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0809",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0971",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0971",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0972",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0972",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0973",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0974",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0975",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0975",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0976",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0976",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0977",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0977",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0978",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0978",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0979",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0979",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0980",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0980",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1096",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1096",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1125",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1125",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1127",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1127",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1128",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1128",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1129",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1129",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1130",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1130",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1131",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1131",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1132",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1133",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1134",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1134",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1135",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1135",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1136",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1136",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1137",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1137",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1138",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1138",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1139",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1139",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1141",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1141",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1142",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1142",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1143",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1143",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1144",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1144",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1145",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1145",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1146",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1146",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1232",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1232",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1305",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1305",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1306",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1306",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1308",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1308",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1309",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1309",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1310",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1310",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1312",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1312",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1313",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1313",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1314",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1314",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1364",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1364",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1477",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1477",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1478",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1478",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1479",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1479",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1480",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1480",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1481",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1481",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1482",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1482",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1483",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1483",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1484",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1484",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1485",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1485",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1486",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1486",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1487",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1487",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1488",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1488",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1489",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1489",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1490",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1490",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1491",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1491",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1492",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1493",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1493",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1494",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1494",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1495",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1495",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1496",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1496",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1497",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1497",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1498",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1498",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1499",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1499",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1500",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1500",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1501",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1501",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1638",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1638",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1639",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1639",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1640",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1640",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1853",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1853",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1854",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1855",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1855",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1856",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1856",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1857",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1857",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1858",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1858",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1859",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1859",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1860",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1860",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1861",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1861",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1862",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1862",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1863",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1863",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1864",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1864",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1865",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1865",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1866",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1866",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1867",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1867",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1868",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1868",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1869",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1870",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1870",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1871",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1871",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1872",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1872",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1873",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1873",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1874",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1875",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1875",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1876",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1876",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1919",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1919",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2399",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2399",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3863",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3863",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4025",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4025",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium-gost to version 102.0.5005.61-alt0.p10.1. \nSecurity Fix(es):\n\n * BDU:2020-04989: Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05187: Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00703: Уязвимость компонента Pointer Lock браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00793: Уязвимость компонента Thumbnail Tab Strip браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00794: Уязвимость компонента Cast браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00795: Уязвимость расширений Extensions браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00796: Уязвимость компонента Accessibility браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00797: Уязвимость компонента Web Search браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00798: Уязвимость компонента Payments браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00799: Уязвимость компонента Extensions Platform браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00810: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00812: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00813: Уязвимость режима чтения Reader Mode браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00816: Уязвимость функции захват экрана (Screen Capture) браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00817: Уязвимость компонента COOP браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00818: Уязвимость компонента Accessibility браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00819: Уязвимость компонента Scroll браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2022-00844: Уязвимость компонента Window Dialog браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00946: Уязвимость компонента GPU браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00947: Уязвимость набора библиотек времени выполнения Mojo браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00955: Уязвимость компонента Gamepad API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2022-00966: Уязвимость компонента Tab Groups браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00967: Уязвимость компонента File Manager браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00968: Уязвимость компонента Webstore API браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00969: Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01076: Уязвимость модуля отображения веб-страниц Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01077: Уязвимость компонента Views браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать выполнить произвольный код\n\n * BDU:2022-01168: Уязвимость компонента Media браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01169: Уязвимость оболочки операционной системы OS Shell браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01170: Уязвимость компонента Canvas браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01171: Уязвимость модуля преобразуования HTML-кода HTML parser браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2022-01174: Уязвимость набора библиотек времени выполнения Mojo браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01230: Уязвимость реализации функции автозаполнения Autofill браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность данных\n\n * BDU:2022-01236: Уязвимость настройки разрешений Permissions браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации\n\n * BDU:2022-01276: Уязвимость адресной строки Omnibox браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01277: Уязвимость интерфейса Cast UI браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01278: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01284: Уязвимость компонента WebXR браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01288: Уязвимость интерфейса Cast UI браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольной код\n\n * BDU:2022-01289: Уязвимость реализации режима Full Screen Mode браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации\n\n * BDU:2022-01297: Уязвимость реализации режима Full Screen Mode браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-01321: Уязвимость режима разделения экрана SplitScreen браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01354: Уязвимость компонента установки Installer браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-01355: Уязвимость компонента MediaStream браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01365: Уязвимость прикладного программного интерфейса для обмена данными Web Share браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01383: Уязвимость макета Blink Layout модуля отображения Blink браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01421: Уязвимость процесса GPU Process браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01423: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01426: Уязвимость службы Safe Browsing браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01428: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01471: Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01494: Уязвимость службы Safe Browsing браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01513: Уязвимость компонента Browser UI браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01514: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01516: Уязвимость компонента Расширения Extensions браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-01519: Уязвимость реализации элемента управления «New Tab» («Новая кладка») браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01904: Уязвимость компонента Web Cursor браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01909: Уязвимость интерфейса Cast UI браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01910: Уязвимость расширения QR Code Generator браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01911: Уязвимость интерфейса WebOTP API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01912: Уязвимость реализации полноэкранного режима (Full Screen Mode) браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01913: Уязвимость прикладного программного интерфейса для обмена данными Web Share браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01917: Уязвимость компонента Shopping Cart браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01918: Уязвимость расширения WebRTC браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01919: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01920: Уязвимость компонента Virtual Keyboard браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01921: Уязвимость файлового менеджера(File Manager) браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01922: Уязвимость программного интерфейса Background Fetch API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01939: Уязвимость компонента Portals браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01966: Уязвимость компонента Extensions браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01967: Уязвимость пользовательского интерфейса WebUI браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01968: Уязвимость элемента управления вкладками «Tab Strip» браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01969: Уязвимость компонента Extensions браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2022-01970: Уязвимость интерфейса Resource Timing API браузеров Google Chrome и Microsoft Edge связана, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02115: Уязвимость браузера Google Chrome, связанная с некорректно реализованной проверкой безопасности для стандартных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02139: Уязвимость компонента BFCache браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02140: Уязвимость хранилища Storage браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-02176: Уязвимость браузера Google Chrome, связанная с ошибками при обработке регулярных выражений, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02177: Уязвимость набора инструментов для веб-разработчиков Developer Tools браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-02178: Уязвимость хранилища Storage браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02179: Уязвимость реализации расширения «Группы вкладок» браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02180: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02336: Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03186: Уязвимость компонента WebApp браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03204: Уязвимость компонента Sharing браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03205: Уязвимость компонента UI Foundations браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03272: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03310: Уязвимость компонента Data Transfer браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03323: Уязвимость интерфейса File System API браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2022-03325: Уязвимость компонента обучения пользователей браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03326: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03327: Уязвимость компонента обмена сообщениями браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03329: Уязвимость браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03331: Уязвимость реализации Extensions браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03332: Уязвимость компонента Bookmarks браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03347: Уязвимость компонента Performance Manager браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03367: Уязвимость компонента Tab Groups браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-03386: Уязвимость набора инструментов для веб-разработки DevTools браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03824: Уязвимость интерфейса File System API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03825: Уязвимость режима планшета браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03826: Уязвимость набора инструментов DevTools браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2022-03827: Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03828: Уязвимость компонента COOP браузера Google Chrome , позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03829: Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03830: Уязвимость плагина PDF браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03831: Уязвимость интерфейса API расширений браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-04377: Уязвимость браузеров Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * CVE-2022-0452: Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-0453: Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0454: Heap buffer overflow in ANGLE in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0456: Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.\n\n * CVE-2022-0457: Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0458: Use after free in Thumbnail Tab Strip in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0459: Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0460: Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0461: Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.\n\n * CVE-2022-0462: Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-0463: Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.\n\n * CVE-2022-0464: Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.\n\n * CVE-2022-0465: Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.\n\n * CVE-2022-0466: Inappropriate implementation in Extensions Platform in Google Chrome prior to 98.0.4758.80 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-0467: Inappropriate implementation in Pointer Lock in Google Chrome on Windows prior to 98.0.4758.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2022-0468: Use after free in Payments in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0469: Use after free in Cast in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0470: Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0603: Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0604: Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0605: Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0606: Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0607: Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0608: Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0609: Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0610: Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0789: Heap buffer overflow in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0790: Use after free in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-0791: Use after free in Omnibox in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via user interactions.\n\n * CVE-2022-0792: Out of bounds read in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0793: Use after free in Cast in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2022-0794: Use after free in WebShare in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0795: Type confusion in Blink Layout in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0796: Use after free in Media in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0797: Out of bounds memory access in Mojo in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.\n\n * CVE-2022-0798: Use after free in MediaStream in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2022-0799: Insufficient policy enforcement in Installer in Google Chrome on Windows prior to 99.0.4844.51 allowed a remote attacker to perform local privilege escalation via a crafted offline installer file.\n\n * CVE-2022-0800: Heap buffer overflow in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0801: Inappropriate implementation in HTML parser in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass XSS preventions via a crafted HTML page. (Chrome security severity: Medium)\n\n * CVE-2022-0802: Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-0803: Inappropriate implementation in Permissions in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to tamper with the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-0804: Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-0805: Use after free in Browser Switcher in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.\n\n * CVE-2022-0806: Data leak in Canvas in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in screen sharing to potentially leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-0807: Inappropriate implementation in Autofill in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2022-0808: Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in a series of user interaction to potentially exploit heap corruption via user interactions.\n\n * CVE-2022-0809: Out of bounds memory access in WebXR in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0971: Use after free in Blink Layout in Google Chrome on Android prior to 99.0.4844.74 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0972: Use after free in Extensions in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0973: Use after free in Safe Browsing in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0974: Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0975: Use after free in ANGLE in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0976: Heap buffer overflow in GPU in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0977: Use after free in Browser UI in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0978: Use after free in ANGLE in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0979: Use after free in Safe Browsing in Google Chrome on Android prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0980: Use after free in New Tab Page in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interactions.\n\n * CVE-2022-1096: Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1125: Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.\n\n * CVE-2022-1127: Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.\n\n * CVE-2022-1128: Inappropriate implementation in Web Share API in Google Chrome on Windows prior to 100.0.4896.60 allowed an attacker on the local network segment to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1129: Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-1130: Insufficient validation of trust input in WebOTP in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to send arbitrary intents from any app via a malicious app.\n\n * CVE-2022-1131: Use after free in Cast UI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1132: Inappropriate implementation in Virtual Keyboard in Google Chrome on Chrome OS prior to 100.0.4896.60 allowed a local attacker to bypass navigation restrictions via physical access to the device.\n\n * CVE-2022-1133: Use after free in WebRTC Perf in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1134: Type confusion in V8 in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1135: Use after free in Shopping Cart in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via standard feature user interaction.\n\n * CVE-2022-1136: Use after free in Tab Strip in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific set of user gestures.\n\n * CVE-2022-1137: Inappropriate implementation in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to leak potentially sensitive information via a crafted HTML page.\n\n * CVE-2022-1138: Inappropriate implementation in Web Cursor in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who had compromised the renderer process to obscure the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-1139: Inappropriate implementation in Background Fetch API in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1141: Use after free in File Manager in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user gesture.\n\n * CVE-2022-1142: Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.\n\n * CVE-2022-1143: Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.\n\n * CVE-2022-1144: Use after free in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.\n\n * CVE-2022-1145: Use after free in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interaction and profile destruction.\n\n * CVE-2022-1146: Inappropriate implementation in Resource Timing in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1232: Type confusion in V8 in Google Chrome prior to 100.0.4896.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1305: Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1306: Inappropriate implementation in compositing in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-1308: Use after free in BFCache in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1309: Insufficient policy enforcement in developer tools in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-1310: Use after free in regular expressions in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1312: Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2022-1313: Use after free in tab groups in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1314: Type confusion in V8 in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1364: Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1477: Use after free in Vulkan in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1478: Use after free in SwiftShader in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1479: Use after free in ANGLE in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1480: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n\n * CVE-2022-1481: Use after free in Sharing in Google Chrome on Mac prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1482: Inappropriate implementation in WebGL in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1483: Heap buffer overflow in WebGPU in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1484: Heap buffer overflow in Web UI Settings in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1485: Use after free in File System API in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1486: Type confusion in V8 in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2022-1487: Use after free in Ozone in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via running a Wayland test.\n\n * CVE-2022-1488: Inappropriate implementation in Extensions API in Google Chrome prior to 101.0.4951.41 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.\n\n * CVE-2022-1489: Out of bounds memory access in UI Shelf in Google Chrome on Chrome OS, Lacros prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.\n\n * CVE-2022-1490: Use after free in Browser Switcher in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1491: Use after free in Bookmarks in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.\n\n * CVE-2022-1492: Insufficient data validation in Blink Editing in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to inject arbitrary scripts or HTML via a crafted HTML page.\n\n * CVE-2022-1493: Use after free in Dev Tools in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.\n\n * CVE-2022-1494: Insufficient data validation in Trusted Types in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass trusted types policy via a crafted HTML page.\n\n * CVE-2022-1495: Incorrect security UI in Downloads in Google Chrome on Android prior to 101.0.4951.41 allowed a remote attacker to spoof the APK downloads dialog via a crafted HTML page.\n\n * CVE-2022-1496: Use after free in File Manager in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.\n\n * CVE-2022-1497: Inappropriate implementation in Input in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to spoof the contents of cross-origin websites via a crafted HTML page.\n\n * CVE-2022-1498: Inappropriate implementation in HTML Parser in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1499: Inappropriate implementation in WebAuthentication in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2022-1500: Insufficient data validation in Dev Tools in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2022-1501: Inappropriate implementation in iframe in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1638: Heap buffer overflow in V8 Internationalization in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1639: Use after free in ANGLE in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1640: Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1853: Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-1854: Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1855: Use after free in Messaging in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1856: Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.\n\n * CVE-2022-1857: Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass file system restrictions via a crafted HTML page.\n\n * CVE-2022-1858: Out of bounds read in DevTools in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform an out of bounds memory read via specific user interaction.\n\n * CVE-2022-1859: Use after free in Performance Manager in Google Chrome prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1860: Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.\n\n * CVE-2022-1861: Use after free in Sharing in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction.\n\n * CVE-2022-1862: Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page.\n\n * CVE-2022-1863: Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.\n\n * CVE-2022-1864: Use after free in WebApp Installs in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.\n\n * CVE-2022-1865: Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.\n\n * CVE-2022-1866: Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions.\n\n * CVE-2022-1867: Insufficient validation of untrusted input in Data Transfer in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass same origin policy via a crafted clipboard content.\n\n * CVE-2022-1868: Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2022-1869: Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1870: Use after free in App Service in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2022-1871: Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass file system policy via a crafted HTML page.\n\n * CVE-2022-1872: Insufficient policy enforcement in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.\n\n * CVE-2022-1873: Insufficient policy enforcement in COOP in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1874: Insufficient policy enforcement in Safe Browsing in Google Chrome on Mac prior to 102.0.5005.61 allowed a remote attacker to bypass downloads protection policy via a crafted HTML page.\n\n * CVE-2022-1875: Inappropriate implementation in PDF in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-1876: Heap buffer overflow in DevTools in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-1919: Use after free in Codecs in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2399: Use after free in WebGPU in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-3863: Use after free in Browser History in Google Chrome prior to 100.0.4896.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)\n\n * CVE-2022-4025: Inappropriate implementation in Paint in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data outside an iframe via a crafted HTML page. (Chrome security severity: Low)\n\n * #41964: Запрос на обновление до версии 98.0.4758.102 в связи c несколькими CVE\n\n * #42263: chromium: лишний параметр сборки fieldtrial_testing_like_official_build",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-06-15"
},
"Updated": {
"Date": "2022-06-15"
},
"BDUs": [
{
"ID": "BDU:2020-04989",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-04989",
"Impact": "Low",
"Public": "20220308"
},
{
"ID": "BDU:2020-05187",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2020-05187",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-00703",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00703",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00793",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00793",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00794",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00794",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00795",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00795",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00796",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00796",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00797",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00797",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00798",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00798",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00799",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00799",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00810",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-00810",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00812",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-00812",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00813",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00813",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00816",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00816",
"Impact": "Critical",
"Public": "20220201"
},
{
"ID": "BDU:2022-00817",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2022-00817",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00818",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00818",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00819",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00819",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-00844",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00844",
"Impact": "Low",
"Public": "20220201"
},
{
"ID": "BDU:2022-00946",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00946",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00947",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-00947",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00955",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00955",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00966",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00966",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00967",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00967",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00968",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00968",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00969",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00969",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-01076",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-01076",
"Impact": "Critical",
"Public": "20211227"
},
{
"ID": "BDU:2022-01077",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01077",
"Impact": "Critical",
"Public": "20220128"
},
{
"ID": "BDU:2022-01168",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01168",
"Impact": "Critical",
"Public": "20220210"
},
{
"ID": "BDU:2022-01169",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01169",
"Impact": "Low",
"Public": "20220129"
},
{
"ID": "BDU:2022-01170",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01170",
"Impact": "Low",
"Public": "20211231"
},
{
"ID": "BDU:2022-01171",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01171",
"Impact": "High",
"Public": "20210720"
},
{
"ID": "BDU:2022-01174",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-01174",
"Impact": "Critical",
"Public": "20211221"
},
{
"ID": "BDU:2022-01230",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01230",
"Impact": "Low",
"Public": "20220114"
},
{
"ID": "BDU:2022-01236",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-275",
"Href": "https://bdu.fstec.ru/vul/2022-01236",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-01276",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01276",
"Impact": "Critical",
"Public": "20211209"
},
{
"ID": "BDU:2022-01277",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01277",
"Impact": "Critical",
"Public": "20211126"
},
{
"ID": "BDU:2022-01278",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-01278",
"Impact": "Low",
"Public": "20220111"
},
{
"ID": "BDU:2022-01284",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-01284",
"Impact": "Low",
"Public": "20220203"
},
{
"ID": "BDU:2022-01288",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01288",
"Impact": "Low",
"Public": "20210824"
},
{
"ID": "BDU:2022-01289",
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-01289",
"Impact": "Low",
"Public": "20211114"
},
{
"ID": "BDU:2022-01297",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01297",
"Impact": "High",
"Public": "20211029"
},
{
"ID": "BDU:2022-01321",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01321",
"Impact": "High",
"Public": "20220317"
},
{
"ID": "BDU:2022-01354",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-01354",
"Impact": "Low",
"Public": "20211212"
},
{
"ID": "BDU:2022-01355",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01355",
"Impact": "Low",
"Public": "20211230"
},
{
"ID": "BDU:2022-01365",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01365",
"Impact": "Critical",
"Public": "20220204"
},
{
"ID": "BDU:2022-01383",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01383",
"Impact": "Critical",
"Public": "20220221"
},
{
"ID": "BDU:2022-01421",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01421",
"Impact": "High",
"Public": "20220213"
},
{
"ID": "BDU:2022-01423",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01423",
"Impact": "Critical",
"Public": "20220121"
},
{
"ID": "BDU:2022-01426",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01426",
"Impact": "High",
"Public": "20220303"
},
{
"ID": "BDU:2022-01428",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01428",
"Impact": "High",
"Public": "20220209"
},
{
"ID": "BDU:2022-01471",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-01471",
"Impact": "Critical",
"Public": "20220325"
},
{
"ID": "BDU:2022-01494",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01494",
"Impact": "High",
"Public": "20220215"
},
{
"ID": "BDU:2022-01513",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01513",
"Impact": "High",
"Public": "20220220"
},
{
"ID": "BDU:2022-01514",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01514",
"Impact": "High",
"Public": "20220220"
},
{
"ID": "BDU:2022-01516",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01516",
"Impact": "High",
"Public": "20220228"
},
{
"ID": "BDU:2022-01519",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01519",
"Impact": "Low",
"Public": "20220302"
},
{
"ID": "BDU:2022-01904",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01904",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2022-01909",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01909",
"Impact": "High",
"Public": "20220215"
},
{
"ID": "BDU:2022-01910",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01910",
"Impact": "Critical",
"Public": "20220128"
},
{
"ID": "BDU:2022-01911",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-01911",
"Impact": "High",
"Public": "20201025"
},
{
"ID": "BDU:2022-01912",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01912",
"Impact": "High",
"Public": "20220401"
},
{
"ID": "BDU:2022-01913",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01913",
"Impact": "High",
"Public": "20220301"
},
{
"ID": "BDU:2022-01917",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01917",
"Impact": "Low",
"Public": "20220109"
},
{
"ID": "BDU:2022-01918",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01918",
"Impact": "High",
"Public": "20220313"
},
{
"ID": "BDU:2022-01919",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-01919",
"Impact": "High",
"Public": "20220321"
},
{
"ID": "BDU:2022-01920",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01920",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-01921",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01921",
"Impact": "Low",
"Public": "20220305"
},
{
"ID": "BDU:2022-01922",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01922",
"Impact": "High",
"Public": "20211110"
},
{
"ID": "BDU:2022-01939",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01939",
"Impact": "Critical",
"Public": "20220129"
},
{
"ID": "BDU:2022-01966",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01966",
"Impact": "Low",
"Public": "20220309"
},
{
"ID": "BDU:2022-01967",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01967",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-01968",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01968",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-01969",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01969",
"Impact": "High",
"Public": "20220122"
},
{
"ID": "BDU:2022-01970",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01970",
"Impact": "Low",
"Public": "20220123"
},
{
"ID": "BDU:2022-02115",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-02115",
"Impact": "High",
"Public": "20220221"
},
{
"ID": "BDU:2022-02139",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02139",
"Impact": "High",
"Public": "20211228"
},
{
"ID": "BDU:2022-02140",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02140",
"Impact": "High",
"Public": "20210107"
},
{
"ID": "BDU:2022-02176",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02176",
"Impact": "High",
"Public": "20220318"
},
{
"ID": "BDU:2022-02177",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-02177",
"Impact": "High",
"Public": "20200717"
},
{
"ID": "BDU:2022-02178",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02178",
"Impact": "High",
"Public": "20220330"
},
{
"ID": "BDU:2022-02179",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02179",
"Impact": "Low",
"Public": "20211116"
},
{
"ID": "BDU:2022-02180",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-02180",
"Impact": "Low",
"Public": "20211116"
},
{
"ID": "BDU:2022-02336",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-02336",
"Impact": "High",
"Public": "20220414"
},
{
"ID": "BDU:2022-03186",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03186",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03204",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03204",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03205",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03205",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03272",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-03272",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03310",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-03310",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03323",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-264, CWE-269",
"Href": "https://bdu.fstec.ru/vul/2022-03323",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03325",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03325",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03326",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03326",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03327",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03327",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03329",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03329",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03331",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-03331",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03332",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03332",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03347",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03347",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-03367",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03367",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03386",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-03386",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03824",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-03824",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03825",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03825",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03826",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-03826",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03827",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-03827",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03828",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-03828",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03829",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-03829",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03830",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-03830",
"Impact": "Low",
"Public": "20220524"
},
{
"ID": "BDU:2022-03831",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-03831",
"Impact": "High",
"Public": "20220524"
},
{
"ID": "BDU:2022-04377",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-04377",
"Impact": "High",
"Public": "20220531"
}
],
"CVEs": [
{
"ID": "CVE-2022-0452",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0452",
"Impact": "Critical",
"Public": "20220405"
},
{
"ID": "CVE-2022-0453",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0453",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0454",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0454",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0456",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0456",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0457",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0457",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0458",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0458",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0459",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0459",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0460",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0460",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0461",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0461",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0462",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0462",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0463",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0463",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0464",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0464",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0465",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0465",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0466",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0466",
"Impact": "Critical",
"Public": "20220405"
},
{
"ID": "CVE-2022-0467",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0467",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0468",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0468",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0469",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0469",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0470",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0470",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0603",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0603",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0604",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0604",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0605",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0605",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0606",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0606",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0607",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0607",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0608",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0608",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0609",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0609",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0610",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0610",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0789",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0789",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0790",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0790",
"Impact": "Critical",
"Public": "20220405"
},
{
"ID": "CVE-2022-0791",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0791",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0792",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0792",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0793",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0793",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0794",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0794",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0795",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0795",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0796",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0796",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0797",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0797",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0798",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0798",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0799",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0799",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0800",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0800",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0801",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0801",
"Impact": "Low",
"Public": "20230102"
},
{
"ID": "CVE-2022-0802",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0802",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0803",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0803",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0804",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0804",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0805",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0805",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0806",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0806",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0807",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0807",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-0808",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0808",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0809",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0809",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-0971",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0971",
"Impact": "High",
"Public": "20220721"
},
{
"ID": "CVE-2022-0972",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0972",
"Impact": "High",
"Public": "20220721"
},
{
"ID": "CVE-2022-0973",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0973",
"Impact": "Critical",
"Public": "20220721"
},
{
"ID": "CVE-2022-0974",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0974",
"Impact": "High",
"Public": "20220721"
},
{
"ID": "CVE-2022-0975",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0975",
"Impact": "High",
"Public": "20220721"
},
{
"ID": "CVE-2022-0976",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0976",
"Impact": "High",
"Public": "20220721"
},
{
"ID": "CVE-2022-0977",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0977",
"Impact": "Critical",
"Public": "20220721"
},
{
"ID": "CVE-2022-0978",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0978",
"Impact": "High",
"Public": "20220722"
},
{
"ID": "CVE-2022-0979",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0979",
"Impact": "High",
"Public": "20220722"
},
{
"ID": "CVE-2022-0980",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0980",
"Impact": "High",
"Public": "20220722"
},
{
"ID": "CVE-2022-1096",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1096",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1125",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1125",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1127",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1127",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1128",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1128",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1129",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1129",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1130",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1130",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1131",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1131",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1132",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1132",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1133",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1133",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1134",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1134",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1135",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1135",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1136",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1136",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1137",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1137",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1138",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1138",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1139",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1139",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1141",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1141",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1142",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1142",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1143",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1143",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1144",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1144",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1145",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1145",
"Impact": "High",
"Public": "20220723"
},
{
"ID": "CVE-2022-1146",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1146",
"Impact": "Low",
"Public": "20220723"
},
{
"ID": "CVE-2022-1232",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1232",
"Impact": "High",
"Public": "20220725"
},
{
"ID": "CVE-2022-1305",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1305",
"Impact": "High",
"Public": "20220725"
},
{
"ID": "CVE-2022-1306",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1306",
"Impact": "Low",
"Public": "20220725"
},
{
"ID": "CVE-2022-1308",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1308",
"Impact": "High",
"Public": "20220725"
},
{
"ID": "CVE-2022-1309",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1309",
"Impact": "Critical",
"Public": "20220725"
},
{
"ID": "CVE-2022-1310",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1310",
"Impact": "High",
"Public": "20220725"
},
{
"ID": "CVE-2022-1312",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1312",
"Impact": "Critical",
"Public": "20220725"
},
{
"ID": "CVE-2022-1313",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1313",
"Impact": "High",
"Public": "20220725"
},
{
"ID": "CVE-2022-1314",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1314",
"Impact": "High",
"Public": "20220725"
},
{
"ID": "CVE-2022-1364",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1364",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1477",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1477",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1478",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1478",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1479",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1479",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1480",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1480",
"Impact": "None",
"Public": "20221003"
},
{
"ID": "CVE-2022-1481",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1481",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1482",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1482",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1483",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1483",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1484",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1484",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1485",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1485",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1486",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1486",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1487",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1487",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1488",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1488",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1489",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1489",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1490",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1490",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1491",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1491",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1492",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1492",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1493",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1493",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1494",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1494",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1495",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1495",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1496",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1496",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1497",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1497",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1498",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1498",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1499",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1499",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1500",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1500",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1501",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1501",
"Impact": "Low",
"Public": "20220726"
},
{
"ID": "CVE-2022-1638",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1638",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1639",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1639",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1640",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1640",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1853",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1853",
"Impact": "Critical",
"Public": "20220727"
},
{
"ID": "CVE-2022-1854",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1854",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1855",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1855",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1856",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1856",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1857",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1857",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1858",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1858",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1859",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1859",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1860",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1860",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1861",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1861",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1862",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1862",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1863",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1863",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1864",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1864",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1865",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1865",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1866",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1866",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1867",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1867",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1868",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1868",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1869",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1869",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1870",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1870",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1871",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1871",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1872",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1872",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1873",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1873",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1874",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1874",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1875",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1875",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-1876",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1876",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-1919",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1919",
"Impact": "High",
"Public": "20220728"
},
{
"ID": "CVE-2022-2399",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2399",
"Impact": "High",
"Public": "20220728"
},
{
"ID": "CVE-2022-3863",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3863",
"Impact": "Low",
"Public": "20230102"
},
{
"ID": "CVE-2022-4025",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4025",
"Impact": "Low",
"Public": "20230102"
}
],
"Bugzilla": [
{
"ID": "41964",
"Href": "https://bugzilla.altlinux.org/41964",
"Data": "Запрос на обновление до версии 98.0.4758.102 в связи c несколькими CVE"
},
{
"ID": "42263",
"Href": "https://bugzilla.altlinux.org/42263",
"Data": "chromium: лишний параметр сборки fieldtrial_testing_like_official_build"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222055001",
"Comment": "chromium-gost is earlier than 0:102.0.5005.61-alt0.p10.1"
}
]
}
]
}
}
]
}