1484 lines
76 KiB
JSON
1484 lines
76 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182414",
|
||
"Version": "oval:org.altlinux.errata:def:20182414",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2414: package `adobe-flash-player-ppapi` update to version 31-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2414",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2414",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00603",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00603",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00604",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00604",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00640",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00640",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00641",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00641",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00642",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00642",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00643",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00643",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00644",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00644",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00964",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00964",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00965",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00965",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00966",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00966",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00967",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00967",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00968",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00968",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00974",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00974",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00975",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00975",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01201",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01201",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01202",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01202",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01203",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01203",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01204",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01204",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01205",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01205",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01206",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01206",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01207",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01207",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01512",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01512",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01513",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01513",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01577",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01577",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01578",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01578",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01579",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01579",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01580",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01580",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01581",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01581",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01582",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01582",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01583",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01583",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00200",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00200",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00201",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00201",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00212",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00212",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00213",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00213",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00214",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00214",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00449",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00449",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00894",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00894",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00993",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00993",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05393",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05393",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05395",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05395",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11213",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11213",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11215",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11215",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11225",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11225",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11281",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11281",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11282",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11282",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11292",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11292",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11305",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11305",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2997",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2997",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2998",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2998",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2999",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2999",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3000",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3000",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3003",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3003",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3058",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3058",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3059",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3059",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3060",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3060",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3061",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3061",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3062",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3062",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3063",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3063",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3064",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3064",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3068",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3068",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3069",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3069",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3070",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3070",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3071",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3071",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3072",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3072",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3073",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3073",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3074",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3074",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3075",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3075",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3076",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3076",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3077",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3077",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3079",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3079",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3081",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3081",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3082",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3082",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3083",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3083",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3084",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3084",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3085",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3085",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3106",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3106",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-3114",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-3114",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15967",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15967",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4871",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4871",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4877",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4877",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4878",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4878",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4919",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4919",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4920",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4920",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4932",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4933",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4934",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4935",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4936",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4937",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4944",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4944",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5000",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5000",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5007",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5007",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5008",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5008",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades adobe-flash-player-ppapi to version 31-alt1. \nSecurity Fix(es):\n\n * BDU:2017-00603: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00604: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00640: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00641: Уязвимость программной платформы Flash Player, позволяющая злоумышленнику нарушить конфиденциальность информации\n\n * BDU:2017-00642: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00643: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00644: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00964: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00965: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00966: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00967: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00968: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00974: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00975: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01201: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01202: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01203: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01204: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01205: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01206: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01207: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01512: Уязвимость функционала метаданных программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01513: Уязвимость SDK-функционала метаданных профиля медиапотока программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01577: Уязвимость класса LocaleID программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01578: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01579: Уязвимость компонента, отвечающего за внутреннее представление растровых данных, программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01580: Уязвимость модуля Adobe Texture Format (ATF) программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01581: Уязвимость анализатора PNG изображений программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01582: Уязвимость модуля MPEG-4 AVC программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-01583: Уязвимость класса ActionsScript 2 XML программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00200: Уязвимость программной платформы Flash Player, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выпонить произвольный код\n\n * BDU:2018-00201: Уязвимость программной платформы Flash Player, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00212: Уязвимость компонента Primetime SDK программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00213: Уязвимость компонента Primetime SDK программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00214: Уязвимость программной платформы Flash Player, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00449: Уязвимость компонента Primetime SDK программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00894: Уязвимость программной платформы Flash Player, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00993: Уязвимость программной платформы Flash Player, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05393: Уязвимость программной платформы Adobe Flash Player, связанная с неправильным индексированием массива данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05395: Уязвимость программной платформы Adobe Flash Player, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2017-11213: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer due to an integer overflow; the computation is part of the abstraction that creates an arbitrarily sized transparent or opaque bitmap image. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.\n\n * CVE-2017-11215: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-11225: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK metadata functionality. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-11281: Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling function. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.\n\n * CVE-2017-11282: Adobe Flash Player has an exploitable memory corruption vulnerability in the MP4 atom parser. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.\n\n * CVE-2017-11292: Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-11305: A regression affecting Adobe Flash Player version 27.0.0.187 (and earlier versions) causes the unintended reset of the global settings preference file when a user clears browser data.\n\n * CVE-2017-2997: Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable buffer overflow / underflow vulnerability in the Primetime TVSDK that supports customizing ad information. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-2998: Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-2999: Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK functionality related to hosting playback surface. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3000: Adobe Flash Player versions 24.0.0.221 and earlier have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure.\n\n * CVE-2017-3001: Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to garbage collection in the ActionScript 2 VM. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3002: Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3003: Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3058: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the sound class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3059: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the internal script object. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3060: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3061: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the SWF parser. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3062: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in ActionScript2 when creating a getter/setter property. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3063: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the ActionScript2 NetStream class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3064: Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability when parsing a shape outline. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3068: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Advanced Video Coding engine. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3069: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3070: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3071: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3072: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3073: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3074: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3075: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability when manipulating the ActionsScript 2 XML class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3076: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the MPEG-4 AVC module. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3077: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the PNG image parser. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3078: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3079: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the internal representation of raster data. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3081: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability during internal computation caused by multiple display object mask manipulations. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3082: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the LocaleID class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3083: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the Primetime SDK functionality related to the profile metadata of the media stream. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3084: Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the advertising metadata functionality. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3085: Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.\n\n * CVE-2017-3106: Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2017-3112: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of AdobePSDK metadata. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.\n\n * CVE-2017-3114: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of providing language- and region- or country- specific functionality. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.\n\n * CVE-2018-15967: Adobe Flash Player versions 30.0.0.154 and earlier have a privilege escalation vulnerability. Successful exploitation could lead to information disclosure.\n\n * CVE-2018-4871: An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.\n\n * CVE-2018-4877: A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player's quality of service functionality. A successful attack can lead to arbitrary code execution.\n\n * CVE-2018-4878: A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.\n\n * CVE-2018-4919: Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable use after free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-4920: Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-4932: Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-4933: Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.\n\n * CVE-2018-4934: Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.\n\n * CVE-2018-4935: Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-4936: Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.\n\n * CVE-2018-4937: Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-4944: Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-4945: Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-5000: Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.\n\n * CVE-2018-5001: Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.\n\n * CVE-2018-5002: Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-5007: Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\n\n * CVE-2018-5008: Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.\n\n * #34369: update required (known vulnerabilities, blocked in chromium)\n\n * #34555: chromium ругается на старый flash\n\n * #34949: Браузер не видит adobe flash player",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-10-02"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-10-02"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2017-00603",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00603",
|
||
"Impact": "Critical",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00604",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00604",
|
||
"Impact": "Critical",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00640",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00640",
|
||
"Impact": "Critical",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00641",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00641",
|
||
"Impact": "Low",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00642",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00642",
|
||
"Impact": "Critical",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00643",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00643",
|
||
"Impact": "Critical",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00644",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00644",
|
||
"Impact": "Critical",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00964",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00964",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00965",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00965",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00966",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00966",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00967",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00967",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00968",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00968",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00974",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00974",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00975",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00975",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01201",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01201",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01202",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01202",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01203",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01203",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01204",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01204",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01205",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01205",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01206",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01206",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01207",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01207",
|
||
"Impact": "Critical",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01512",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01512",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01513",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01513",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01577",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01577",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01578",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01578",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01579",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01579",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01580",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01580",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01581",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01581",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01582",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01582",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01583",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01583",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00200",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00200",
|
||
"Impact": "Critical",
|
||
"Public": "20171114"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00201",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00201",
|
||
"Impact": "Critical",
|
||
"Public": "20171114"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00212",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00212",
|
||
"Impact": "Critical",
|
||
"Public": "20171114"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00213",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00213",
|
||
"Impact": "Critical",
|
||
"Public": "20171114"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00214",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00214",
|
||
"Impact": "Critical",
|
||
"Public": "20171113"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00449",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00449",
|
||
"Impact": "Critical",
|
||
"Public": "20180206"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00894",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00894",
|
||
"Impact": "High",
|
||
"Public": "20180410"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-00993",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00993",
|
||
"Impact": "Critical",
|
||
"Public": "20180131"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05393",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05393",
|
||
"Impact": "High",
|
||
"Public": "20171016"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05395",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05395",
|
||
"Impact": "Critical",
|
||
"Public": "20180607"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2017-11213",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11213",
|
||
"Impact": "Critical",
|
||
"Public": "20171209"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11215",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11215",
|
||
"Impact": "Critical",
|
||
"Public": "20171209"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11225",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11225",
|
||
"Impact": "Critical",
|
||
"Public": "20171209"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11281",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11281",
|
||
"Impact": "Critical",
|
||
"Public": "20171201"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11282",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11282",
|
||
"Impact": "Critical",
|
||
"Public": "20171201"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11292",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11292",
|
||
"Impact": "High",
|
||
"Public": "20171022"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11305",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11305",
|
||
"Impact": "Low",
|
||
"Public": "20171213"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2997",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2997",
|
||
"Impact": "High",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2998",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2998",
|
||
"Impact": "High",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2999",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2999",
|
||
"Impact": "High",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3000",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3000",
|
||
"Impact": "Low",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3001",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3001",
|
||
"Impact": "High",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3002",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3002",
|
||
"Impact": "High",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3003",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3003",
|
||
"Impact": "High",
|
||
"Public": "20170314"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3058",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3058",
|
||
"Impact": "High",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3059",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3059",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3060",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3060",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3061",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3061",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3062",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3062",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3063",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3063",
|
||
"Impact": "Critical",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3064",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3064",
|
||
"Impact": "High",
|
||
"Public": "20170412"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3068",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3068",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3069",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3069",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3070",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3070",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3071",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3071",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3072",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3072",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3073",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3073",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3074",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3074",
|
||
"Impact": "High",
|
||
"Public": "20170509"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3075",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3075",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3076",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3076",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3077",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3077",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3078",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3078",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3079",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3079",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3081",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3081",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3082",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3082",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3083",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3083",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3084",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3084",
|
||
"Impact": "Critical",
|
||
"Public": "20170620"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3085",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3085",
|
||
"Impact": "High",
|
||
"Public": "20170811"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3106",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3106",
|
||
"Impact": "High",
|
||
"Public": "20170811"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3112",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3112",
|
||
"Impact": "Critical",
|
||
"Public": "20171209"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-3114",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-3114",
|
||
"Impact": "Critical",
|
||
"Public": "20171209"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15967",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15967",
|
||
"Impact": "High",
|
||
"Public": "20180925"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4871",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4871",
|
||
"Impact": "High",
|
||
"Public": "20180109"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4877",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4877",
|
||
"Impact": "Critical",
|
||
"Public": "20180206"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4878",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4878",
|
||
"Impact": "Critical",
|
||
"Public": "20180206"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4919",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4919",
|
||
"Impact": "High",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4920",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4920",
|
||
"Impact": "High",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4932",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
|
||
"Impact": "High",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4933",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
|
||
"Impact": "Low",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4934",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
|
||
"Impact": "Low",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4935",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
|
||
"Impact": "High",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4936",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
|
||
"Impact": "Low",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4937",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
|
||
"Impact": "High",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4944",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4944",
|
||
"Impact": "Critical",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4945",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4945",
|
||
"Impact": "High",
|
||
"Public": "20180709"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5000",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5000",
|
||
"Impact": "Low",
|
||
"Public": "20180709"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5001",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5001",
|
||
"Impact": "Low",
|
||
"Public": "20180709"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5002",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5002",
|
||
"Impact": "Critical",
|
||
"Public": "20180709"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5007",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5007",
|
||
"Impact": "High",
|
||
"Public": "20180720"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5008",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5008",
|
||
"Impact": "High",
|
||
"Public": "20180720"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "34369",
|
||
"Href": "https://bugzilla.altlinux.org/34369",
|
||
"Data": "update required (known vulnerabilities, blocked in chromium)"
|
||
},
|
||
{
|
||
"ID": "34555",
|
||
"Href": "https://bugzilla.altlinux.org/34555",
|
||
"Data": "chromium ругается на старый flash"
|
||
},
|
||
{
|
||
"ID": "34949",
|
||
"Href": "https://bugzilla.altlinux.org/34949",
|
||
"Data": "Браузер не видит adobe flash player"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182414001",
|
||
"Comment": "ppapi-plugin-adobe-flash is earlier than 3:31.0.0.108-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |