3520 lines
208 KiB
JSON
3520 lines
208 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20231139",
|
||
"Version": "oval:org.altlinux.errata:def:20231139",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2023-1139: package `firefox` update to version 105.0.1-alt0.c9.1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2023-1139",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1139",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03660",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03660",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05696",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05696",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05703",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05703",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05704",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05704",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05705",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05705",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05706",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05706",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05708",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05708",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06177",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06177",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06178",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06178",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06179",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06179",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06180",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06180",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06181",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06181",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06182",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06182",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06183",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06183",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06191",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06191",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06192",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06192",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06242",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06242",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00287",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00287",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00288",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00288",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00289",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00289",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00290",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00290",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00291",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00291",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00292",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00292",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00293",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00293",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00294",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00294",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00295",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00295",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00296",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00296",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00297",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00297",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00298",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00298",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00299",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00299",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00300",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00300",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00802",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00802",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00803",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00803",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00804",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00804",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00807",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00807",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00808",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00808",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00809",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00809",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00871",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00871",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01146",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01146",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01147",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01147",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01446",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01446",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01447",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01447",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01448",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01448",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01454",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01454",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01483",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01483",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02132",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02132",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02133",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02133",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02138",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02138",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02370",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02370",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02373",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02373",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02956",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02956",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02988",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02988",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03073",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03073",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03074",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03074",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03075",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03075",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03076",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03076",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03077",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03077",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04062",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04062",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04065",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04065",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04243",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04243",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04348",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04348",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04377",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04377",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04378",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04378",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04379",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04379",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04380",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04380",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04381",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04381",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04382",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04382",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04383",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04383",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04384",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04384",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04429",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04429",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04438",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04438",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04442",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04442",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04557",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04557",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04618",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04618",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04769",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04769",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04776",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04776",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04778",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04778",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05101",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05101",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05298",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05298",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05446",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05446",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05447",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05447",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05497",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05497",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05560",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05560",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05566",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05566",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05607",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05607",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05748",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05748",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05989",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05989",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06030",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06030",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06049",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06049",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06059",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06059",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06106",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06106",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06107",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06107",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06108",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06108",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06109",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06109",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06140",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06140",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06141",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06141",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06142",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06142",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06144",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06144",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06166",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06166",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06186",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06186",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06198",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06198",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06205",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06205",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06240",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06240",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06252",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06252",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06253",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06253",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07017",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07017",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01268",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01268",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02697",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02697",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02783",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02783",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30547",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30547",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38503",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38503",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38504",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38504",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38505",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38505",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38506",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38506",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38507",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38507",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38508",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38508",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38509",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38509",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38510",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38510",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4129",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4129",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4140",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4140",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43531",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43531",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43532",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43532",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43533",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43533",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43534",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43534",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43536",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43536",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43537",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43537",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43538",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43538",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43539",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43539",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43540",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43540",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43541",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43541",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43542",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43542",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43543",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43543",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43544",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43544",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43545",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43545",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43546",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43546",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0511",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0511",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0843",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0843",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1097",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1529",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1529",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1802",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1802",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1919",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1919",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2200",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2200",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22736",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22736",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22737",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22737",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22738",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22738",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22739",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22739",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22740",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22740",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22741",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22741",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22742",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22742",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22745",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22745",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22746",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22746",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22747",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22747",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22748",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22748",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22749",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22749",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22750",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22750",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22751",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22751",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22752",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22752",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22753",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22753",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22754",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22754",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22755",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22755",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22756",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22756",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22757",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22757",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22758",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22758",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22759",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22759",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22760",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22760",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22761",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22761",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22762",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22762",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22763",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22763",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-22764",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-22764",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24713",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2505",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2505",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26381",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26381",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26382",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26382",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26383",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26383",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26384",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26384",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26385",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26385",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26387",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26387",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26486",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26486",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28281",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28282",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28283",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28283",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28284",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28284",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28285",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28286",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28287",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28287",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28288",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28288",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28289",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29909",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29909",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29910",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29910",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29911",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29911",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29912",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29912",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29914",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29914",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29915",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29915",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29916",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29916",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29917",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29917",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29918",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29918",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31736",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31736",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31737",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31737",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31738",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31738",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31739",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31739",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31740",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31740",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31741",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31741",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31742",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31742",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31745",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31745",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31747",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31747",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31748",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31748",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3266",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3266",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34468",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34468",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34469",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34469",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34470",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34470",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34471",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34471",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34472",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34472",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34473",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34473",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34474",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34474",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34475",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34475",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34478",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34478",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34479",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34479",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34481",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34481",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34482",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34482",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34483",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34483",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34484",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34484",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36314",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36314",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36315",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36315",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36316",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36316",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36317",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36317",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36319",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36319",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36320",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36320",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38472",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38472",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38473",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38473",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38474",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38474",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38475",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38475",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38478",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38478",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40956",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40956",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40957",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40957",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40958",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40958",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40959",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40959",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40960",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40960",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40961",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40961",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40962",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40962",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-46880",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-46880",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-25746",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25746",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades firefox to version 105.0.1-alt0.c9.1. \nSecurity Fix(es):\n\n * BDU:2021-03660: Уязвимость почтового клиента Mozilla Thunderbird, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05696: Уязвимость веб-браузера Firefox и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05703: Уязвимость браузера Mozilla Firefox, связанная с некорректным ограничением визуализированных слоев пользовательского интерфейса, позволяющая нарушителю проводить атаки с использованием спуфинга\n\n * BDU:2021-05704: Уязвимость браузера Mozilla Firefox, связанная с ошибками в настройках безопасности, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2021-05705: Уязвимость браузера Mozilla Firefox, связанная с недостаточным предупреждением об опасных действиях, позволяющая нарушителю провести атаку с использованием спуфинга\n\n * BDU:2021-05706: Уязвимость браузера Mozilla Firefox, связанная с ошибками в настройках безопасности, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-05708: Уязвимость браузера Mozilla Firefox, связанная с некорректным ограничением визуализированных слоев пользовательского интерфейса, позволяющая нарушителю проводить атаки с использованием спуфинга\n\n * BDU:2021-06177: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с ошибками криптографических преобразований, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-06178: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-06179: Уязвимость обработки запросов XMLHttpRequest браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-06180: Уязвимость обработки политик CSP браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с ошибками в настройках безопасности, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-06181: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с ошибками криптографических преобразований, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-06182: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с неправильным преобразованием типов, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06183: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-06191: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06192: Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю выполнить отказ в обслуживании\n\n * BDU:2021-06242: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с записью за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00287: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с неверным ограничением визуализируемых слоев или фреймов пользовательского интерфейса из-за состояния гонки при вызове reportValidity, позволяющая нарушителю обойти полноэкранное уведомление и провести спуфинговую атаку\n\n * BDU:2022-00288: Уязвимость изолированной среды iframe почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю использовать неверное ограничение визуализируемых слоев или фреймов пользовательского интерфейса\n\n * BDU:2022-00289: Уязвимость режима редактирования почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю инициировать несанкционированную запись и выполнение произвольного кода в целевой системе\n\n * BDU:2022-00290: Уязвимость пользовательского интерфейса почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с неверным ограничением визуализируемых слоев или фреймов, позволяющая нарушителю использовать неверное ограничение визуализируемых слоев или фреймов пользовательского интерфейса\n\n * BDU:2022-00291: Уязвимость функции ChannelEventQueue::mOwner почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать ошибку использования после освобождения и выполнить произвольный код в системе\n\n * BDU:2022-00292: Уязвимость функции blendGaussianBlur почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать переполнение буфера кучи и выполнить произвольный код в целевой системе\n\n * BDU:2022-00293: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения из-за состояния гонки при воспроизведении аудиофайлов, позволяющая нарушителю создать специально созданную звуковую оболочку, вызвать ошибку использования после освобождения и выполнить произвольный код в системе\n\n * BDU:2022-00294: Уязвимость изолированной среды iframe почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти изолированную программную среду iframe и выполнить произвольный код JavaScript в контексте произвольного окна\n\n * BDU:2022-00295: Уязвимость изолированной среды iframe почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с некорректной обработкой пользовательских данных, позволяющая нарушителю выполнить спуфинговую атаку\n\n * BDU:2022-00296: Уязвимость компонента securitypolicyviolation почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-00297: Уязвимость функции «Copy as curl» в DevTools почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольные команды в системе\n\n * BDU:2022-00298: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с неправильной проверкой ввода пустой последовательности pkcs7, передаваемой как часть данных сертификата, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2022-00299: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с обходом введенных ограничений безопасности, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2022-00300: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с неверным ограничением операций в пределах буфера памяти при обработке содержимого HTML, позволяющая нарушителю вызвать повреждение памяти и выполнить произвольный код в целевой системе\n\n * BDU:2022-00802: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00803: Уязвимость компонента Content Security Policy (CSP) браузера Mozilla Firefox, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00804: Уязвимость механизма Web Workers браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00807: Уязвимость реализации расширений браузера Mozilla Firefox, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2022-00808: Уязвимость функции перетаскивания изображений браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00809: Уязвимость элемента iframe браузера Mozilla Firefox, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2022-00871: Уязвимость службы Maintenance (Updater) Service браузера Mozilla Firefox, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01146: Уязвимость параметра XSLT браузеров Mozilla Firefox и Focus, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01147: Уязвимость программного интерфейса обработки 3D-графики и вычислений WebGPU браузеров Mozilla Firefox и Focus, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01446: Уязвимость браузера Mozilla Firefox, связанная с недостаточным предупреждением об опасных действиях, позволяющая нарушителю выполнить спуфинговую атаку\n\n * BDU:2022-01447: Уязвимость браузера Mozilla Firefox, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01448: Уязвимость браузера Mozilla Firefox, связанная с недостатками разграничения доступа, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2022-01454: Уязвимость браузера Mozilla Firefox, связанная с состоянием гонки при проверке подписей, позволяющая нарушителю выполнить спуфинговую атаку\n\n * BDU:2022-01483: Уязвимость браузеров Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02132: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02133: Уязвимость браузера Mozilla Firefox, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02138: Уязвимость почтового клиента Thunderbird, браузеров Mozilla Firefox и Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02370: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой освобождения памяти при обработке ссылок rel=\u0026quot;localization\u0026quot;, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02373: Уязвимость реализации проверки регулярных выражений (regex для Rust) веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02956: Уязвимость веб-браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02988: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-03073: Уязвимость уведомлений пользовательского интерфейса поноэкранного режима (Fullscreen UI) веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-03074: Уязвимость режима чтения веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2022-03075: Уязвимость изолированной среды iframe веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-03076: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить доступ к защищаемой информации или оказать другое воздействие\n\n * BDU:2022-03077: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-04062: Уязвимость функции nsTArray_Impl::ReplaceElementsAt() почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04065: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, связанная с неправильной обработкой ошибок при обработке недоступного PAC-файла, позволяющая нарушителю задать URL-адрес PAC, и если сервер, на котором размещен PAC, недоступен, запросы OCSP блокируются, что приводит к отображению неверных страниц ошибок\n\n * BDU:2022-04243: Уязвимость почтового клиента Thunderbird, браузера Firefox ESR, связанная с ошибкой при обработке таблиц стилей CSS, доступных через внутренние URI, как «ресурс:», позволяющая нарушителю обойти реализованную политику безопасности содержимого\n\n * BDU:2022-04348: Уязвимость API-интерфейса Performance браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-04377: Уязвимость браузеров Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-04378: Уязвимость браузеров Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04379: Уязвимость синтаксического анализатора HTML браузеров Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2022-04380: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками отображения символа % в директориях %HOMEPATH% и %APPDATA%, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-04381: Уязвимость компонента Garbage Collector браузеров Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04382: Уязвимость реализации механизма CORS (Cross-Origin Resource Sharing) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-04383: Уязвимость реализации полноэкранного режима браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-04384: Уязвимость реализации механизма CORS (Cross-Origin Resource Sharing) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-04429: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками при инициализации переменных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04438: Уязвимость API для 3D-графики WebGL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04442: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-04557: Уязвимость реализации технологии WASM браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04618: Уязвимость функции sourceMapURL набора инструментов для веб-разработки DevTools браузера Firefox, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-04769: Уязвимость браузера Mozilla Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04776: Уязвимость браузера Mozilla Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04778: Уязвимость браузера Mozilla Firefox, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05101: Уязвимость реализации элемента SVG \u0026lt;use\u0026gt; браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код JavaScript\n\n * BDU:2022-05298: Уязвимость функции PK11_ChangePW браузера Mozilla Firefox, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05446: Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05447: Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05497: Уязвимость реализации технологии XSLT (eXtensible Stylesheet Language Transformations) почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05560: Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-05566: Уязвимость реализации технологии XSLT (eXtensible Stylesheet Language Transformations) браузера Firefox и почтового клиента Thunderbirds, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-05607: Уязвимость браузера Mozilla Firefox, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05748: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05989: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю инициировать сетевые запросы\n\n * BDU:2022-06030: Уязвимость браузера Mozilla Firefox, связанная с недостатком в механизме подтверждения источника, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06049: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06059: Уязвимость механизма загрузки DLL-библиотек веб-браузера Firefox для Windows, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06106: Уязвимость браузера Mozilla Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06107: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06108: Уязвимость браузера Mozilla Firefox, связанная с некорректным ограничением визуализированных слоев пользовательского интерфейса, позволяющая нарушителю проводить спуфинг атаки\n\n * BDU:2022-06109: Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками управления ресурсом, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2022-06140: Уязвимость браузера Mozilla Firefox для Android, связанная с ошибками в обработчике USSD-кодов, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06141: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю раскрыть защищаемую информацию, изменить внешний вид веб-страницы, выполнить фишинговые атаки\n\n * BDU:2022-06142: Уязвимость браузера Mozilla Firefox, почтового клиента Thunderbird, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнить произвольный JavaScript-код\n\n * BDU:2022-06144: Уязвимость браузера Mozilla Firefox, связанная с недостаточным контролем ресурса в период его существовования при преобразовании XML-документов, позволяющая нарушителю выполнить произвольный JavaScript-код\n\n * BDU:2022-06166: Уязвимость драйвера WebDriver браузера Mozilla Firefox, позволяющая нарушителю раскрыть защищаемую информацию и выполнить произвольный код\n\n * BDU:2022-06186: Уязвимость веб-браузера Firefox, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06198: Уязвимость реализации конфигурации CSP: base-uri браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-06205: Уязвимость реализации технологии WASM браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06240: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничение безопасного контекста для файлов cookie с префиксом __Host и __Secure и перезаписать эти файлы\n\n * BDU:2022-06252: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-06253: Уязвимость реализации механизма FeaturePolicy браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-07017: Уязвимость графического драйвера браузера Mozilla Firefox для Android, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01268: Уязвимость браузеров Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе\n\n * BDU:2023-02697: Уязвимость службы Safe Browsing браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код в целевой системе, а также вызвать повреждение памяти\n\n * BDU:2023-02783: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти в процессе некорректного программного рендеринга видео с кодировкой H.264, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * CVE-2021-30547: Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.\n\n * CVE-2021-38503: The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38504: When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38505: Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38506: Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38507: The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38508: By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38509: Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-38510: The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-4129: Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 95, Firefox ESR \u003c 91.4.0, and Thunderbird \u003c 91.4.0.\n\n * CVE-2021-4140: It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2021-43531: When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox \u003c 94.\n\n * CVE-2021-43532: The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox \u003c 94.\n\n * CVE-2021-43533: When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox \u003c 94.\n\n * CVE-2021-43534: Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 94, Thunderbird \u003c 91.3, and Firefox ESR \u003c 91.3.\n\n * CVE-2021-43536: Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43537: An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43538: By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43539: Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43540: WebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites that would not have been uninstalled with the extension. This vulnerability affects Firefox \u003c 95.\n\n * CVE-2021-43541: When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43542: Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43543: Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43544: When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 95.\n\n * CVE-2021-43545: Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2021-43546: It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird \u003c 91.4.0, Firefox ESR \u003c 91.4.0, and Firefox \u003c 95.\n\n * CVE-2022-0511: Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 97.\n\n * CVE-2022-0843: Mozilla developers Kershaw Chang, Ryan VanderMeulen, and Randell Jesup reported memory safety bugs present in Firefox 97. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 98.\n\n * CVE-2022-1097: \u003ccode\u003eNSSToken\u003c/code\u003e objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.8, Firefox \u003c 99, and Firefox ESR \u003c 91.8.\n\n * CVE-2022-1529: An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR \u003c 91.9.1, Firefox \u003c 100.0.2, Firefox for Android \u003c 100.3.0, and Thunderbird \u003c 91.9.1.\n\n * CVE-2022-1802: If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR \u003c 91.9.1, Firefox \u003c 100.0.2, Firefox for Android \u003c 100.3.0, and Thunderbird \u003c 91.9.1.\n\n * CVE-2022-1919: Use after free in Codecs in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-2200: If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-22736: If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default.\u003cbr\u003e*This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 96.\n\n * CVE-2022-22737: Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22738: Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22739: Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22740: Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22741: When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22742: When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22743: When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22744: The constructed curl command from the \"Copy as curl\" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.\u003cbr\u003e*This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22745: Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22746: A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.\u003cbr\u003e*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22747: After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22748: Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22749: When scanning QR codes, Firefox for Android would have allowed navigation to some URLs that do not point to web content.\u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 96.\n\n * CVE-2022-22750: By generally accepting and passing resource handles across processes, a compromised content process might have confused higher privileged processes to interact with handles that the unprivileged process should not have access to.\u003cbr\u003e*This bug only affects Firefox for Windows and MacOS. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 96.\n\n * CVE-2022-22751: Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 91.5, Firefox \u003c 96, and Thunderbird \u003c 91.5.\n\n * CVE-2022-22752: Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 96.\n\n * CVE-2022-22753: A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant Users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access.\u003cbr\u003e*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22754: If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22755: By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox \u003c 97.\n\n * CVE-2022-22756: If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22757: Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it. \u003cbr\u003e*This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox \u003c 97.\n\n * CVE-2022-22758: When clicking on a tel: link, USSD codes, specified after a \u003ccode\u003e\\*\u003c/code\u003e character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar to a cross-site request forgery attack.\u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 97.\n\n * CVE-2022-22759: If a document created a sandboxed iframe without \u003ccode\u003eallow-scripts\u003c/code\u003e, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22760: When importing resources using Web Workers, error messages would distinguish the difference between \u003ccode\u003eapplication/javascript\u003c/code\u003e responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22761: Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22762: Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. \u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 97.\n\n * CVE-2022-22763: When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox \u003c 96, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-22764: Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 97, Thunderbird \u003c 91.6, and Firefox ESR \u003c 91.6.\n\n * CVE-2022-24713: regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.\n\n * CVE-2022-2505: Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.\n\n * CVE-2022-26381: An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox \u003c 98, Firefox ESR \u003c 91.7, and Thunderbird \u003c 91.7.\n\n * CVE-2022-26382: While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage. This vulnerability affects Firefox \u003c 98.\n\n * CVE-2022-26383: When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox \u003c 98, Firefox ESR \u003c 91.7, and Thunderbird \u003c 91.7.\n\n * CVE-2022-26384: If an attacker could control the contents of an iframe sandboxed with \u003ccode\u003eallow-popups\u003c/code\u003e but not \u003ccode\u003eallow-scripts\u003c/code\u003e, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox \u003c 98, Firefox ESR \u003c 91.7, and Thunderbird \u003c 91.7.\n\n * CVE-2022-26385: In unusual circumstances, an individual thread may outlive the thread's manager during shutdown. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox \u003c 98.\n\n * CVE-2022-26387: When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox \u003c 98, Firefox ESR \u003c 91.7, and Thunderbird \u003c 91.7.\n\n * CVE-2022-26485: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox \u003c 97.0.2, Firefox ESR \u003c 91.6.1, Firefox for Android \u003c 97.3.0, Thunderbird \u003c 91.6.2, and Focus \u003c 97.3.0.\n\n * CVE-2022-26486: An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox \u003c 97.0.2, Firefox ESR \u003c 91.6.1, Firefox for Android \u003c 97.3.0, Thunderbird \u003c 91.6.2, and Focus \u003c 97.3.0.\n\n * CVE-2022-28281: If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.8, Firefox \u003c 99, and Firefox ESR \u003c 91.8.\n\n * CVE-2022-28282: By using a link with \u003ccode\u003erel=\"localization\"\u003c/code\u003e a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird \u003c 91.8, Firefox \u003c 99, and Firefox ESR \u003c 91.8.\n\n * CVE-2022-28283: The sourceMapURL feature in devtools was missing security checks that would have allowed a webpage to attempt to include local files or other files that should have been inaccessible. This vulnerability affects Firefox \u003c 99.\n\n * CVE-2022-28284: SVG's \u003ccode\u003e\u0026lt;use\u0026gt;\u003c/code\u003e element could have been used to load unexpected content that could have executed script in certain circumstances. While the specification seems to allow this, other browsers do not, and web developers relied on this property for script security so gecko's implementation was aligned with theirs. This vulnerability affects Firefox \u003c 99.\n\n * CVE-2022-28285: When generating the assembly code for \u003ccode\u003eMLoadTypedArrayElementHole\u003c/code\u003e, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird \u003c 91.8, Firefox \u003c 99, and Firefox ESR \u003c 91.8.\n\n * CVE-2022-28286: Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird \u003c 91.8, Firefox \u003c 99, and Firefox ESR \u003c 91.8.\n\n * CVE-2022-28287: In unusual circumstances, selecting text could cause text selection caching to behave incorrectly, leading to a crash. This vulnerability affects Firefox \u003c 99.\n\n * CVE-2022-28288: Mozilla developers and community members Randell Jesup, Sebastian Hengst, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 99.\n\n * CVE-2022-28289: Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.8, Firefox \u003c 99, and Firefox ESR \u003c 91.8.\n\n * CVE-2022-29909: Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\n\n * CVE-2022-29910: When closed or sent to the background, Firefox for Android would not properly record and persist HSTS settings.\u003cbr\u003e*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 100.\n\n * CVE-2022-29911: An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\n\n * CVE-2022-29912: Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\n\n * CVE-2022-29914: When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\n\n * CVE-2022-29915: The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects. This vulnerability affects Firefox \u003c 100.\n\n * CVE-2022-29916: Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\n\n * CVE-2022-29917: Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\n\n * CVE-2022-29918: Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 100.\n\n * CVE-2022-31736: A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31737: A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31738: When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31739: When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.\u003cbr\u003e*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31740: On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31741: A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31742: An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31743: Firefox's HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox \u003c 101.\n\n * CVE-2022-31744: An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR \u003c 91.11, Thunderbird \u003c 102, Thunderbird \u003c 91.11, and Firefox \u003c 101.\n\n * CVE-2022-31745: If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox \u003c 101.\n\n * CVE-2022-31747: Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\n\n * CVE-2022-31748: Mozilla developers Gabriele Svelto, Timothy Nikkel, Randell Jesup, Jon Coppeard, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 101.\n\n * CVE-2022-3266: An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-34468: An iframe that was not permitted to run scripts could do so if the user clicked on a \u003ccode\u003ejavascript:\u003c/code\u003e link. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34469: When a TLS Certificate error occurs on a domain protected by the HSTS header, the browser should not allow the user to bypass the certificate error. On Firefox for Android, the user was presented with the option to bypass the error; this could only have been done by the user explicitly. \u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34470: Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34471: When downloading an update for an addon, the downloaded addon update's version was not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34472: If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34473: The HTML Sanitizer should have sanitized the \u003ccode\u003ehref\u003c/code\u003e attribute of SVG \u003ccode\u003e\u0026lt;use\u0026gt;\u003c/code\u003e tags; however it incorrectly did not sanitize \u003ccode\u003exlink:href\u003c/code\u003e attributes. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34474: Even when an iframe was sandboxed with \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34475: SVG \u003ccode\u003e\u0026lt;use\u0026gt;\u003c/code\u003e tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34476: ASN.1 parsing of an indefinite SEQUENCE inside an indefinite GROUP could have resulted in the parser accepting malformed ASN.1. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34477: The MediaError message property should be consistent to avoid leaking information about cross-origin resources; however for a same-site cross-origin resource, the message could have leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34478: The \u003ccode\u003ems-msdt\u003c/code\u003e, \u003ccode\u003esearch\u003c/code\u003e, and \u003ccode\u003esearch-ms\u003c/code\u003e protocols deliver content to Microsoft applications, bypassing the browser, when a user accepts a prompt. These applications have had known vulnerabilities, exploited in the wild (although we know of none exploited through Thunderbird), so in this release Thunderbird has blocked these protocols from prompting the user to open them.\u003cbr\u003e*This bug only affects Thunderbird on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34479: A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks. \u003cbr\u003e*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34480: Within the \u003ccode\u003elg_init()\u003c/code\u003e function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34481: In the \u003ccode\u003ensTArray_Impl::ReplaceElementsAt()\u003c/code\u003e function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34482: An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34483. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34483: An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34482. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-34484: The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 102, Firefox ESR \u003c 91.11, Thunderbird \u003c 102, and Thunderbird \u003c 91.11.\n\n * CVE-2022-34485: Mozilla developers Bryce Seager van Dyk and the Mozilla Fuzzing Team reported potential vulnerabilities present in Firefox 101. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 102.\n\n * CVE-2022-36314: When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.\n\n * CVE-2022-36315: When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-36316: When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-36317: When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service.\u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-36318: When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.\n\n * CVE-2022-36319: When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.\n\n * CVE-2022-36320: Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 103.\n\n * CVE-2022-38472: An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-38473: A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access). This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-38474: A website that had permission to access the microphone could record audio without the audio notification being shown. This bug does not allow the attacker to bypass the permission prompt - it only affects the notification shown once permission has been granted.\u003cbr /\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 104.\n\n * CVE-2022-38475: An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox \u003c 104.\n\n * CVE-2022-38476: A data race could occur in the \u003ccode\u003ePK11_ChangePW\u003c/code\u003e function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR \u003c 102.2 and Thunderbird \u003c 102.2.\n\n * CVE-2022-38477: Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.2, Thunderbird \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-38478: Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\n\n * CVE-2022-40956: When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40957: Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.\u003cbr\u003e*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40958: By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40959: During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40960: Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-40961: During startup, a graphics driver with an unexpected name could lead to a stack-buffer overflow causing a potentially exploitable crash.\u003cbr\u003e*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 105.\n\n * CVE-2022-40962: Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.\n\n * CVE-2022-46880: A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.\u003cbr /\u003e*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR \u003c 102.6, Firefox \u003c 105, and Thunderbird \u003c 102.6.\n\n * CVE-2023-1945: Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 102.10 and Firefox ESR \u003c 102.10.\n\n * CVE-2023-25746: Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 102.8 and Firefox ESR \u003c 102.8.\n\n * #43733: Перенести firefox-wayland в firefox",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2023-01-26"
|
||
},
|
||
"Updated": {
|
||
"Date": "2023-01-26"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-03660",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03660",
|
||
"Impact": "High",
|
||
"Public": "20210713"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05696",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05696",
|
||
"Impact": "High",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05703",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05703",
|
||
"Impact": "Low",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05704",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05704",
|
||
"Impact": "Low",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05705",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-357",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05705",
|
||
"Impact": "Low",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05706",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05706",
|
||
"Impact": "High",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05708",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05708",
|
||
"Impact": "Low",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06177",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06177",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06178",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06178",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06179",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06179",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06180",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06180",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06181",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06181",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06182",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06182",
|
||
"Impact": "High",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06183",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06183",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06191",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06191",
|
||
"Impact": "High",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06192",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06192",
|
||
"Impact": "Low",
|
||
"Public": "20211207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06242",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06242",
|
||
"Impact": "High",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00287",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00287",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00288",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00288",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00289",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00289",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00290",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00290",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00291",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00291",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00292",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-112",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00292",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00293",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00293",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00294",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00294",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00295",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00295",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00296",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00296",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00297",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-78",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00297",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00298",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00298",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00299",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00299",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00300",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00300",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00802",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00802",
|
||
"Impact": "High",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00803",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00803",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00804",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00804",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00807",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00807",
|
||
"Impact": "High",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00808",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-357",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00808",
|
||
"Impact": "High",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00809",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00809",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00871",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00871",
|
||
"Impact": "High",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01146",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01146",
|
||
"Impact": "High",
|
||
"Public": "20220305"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01147",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01147",
|
||
"Impact": "High",
|
||
"Public": "20220305"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01446",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-357",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01446",
|
||
"Impact": "Low",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01447",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01447",
|
||
"Impact": "High",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01448",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01448",
|
||
"Impact": "Low",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01454",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01454",
|
||
"Impact": "Low",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01483",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01483",
|
||
"Impact": "High",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02132",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02132",
|
||
"Impact": "High",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02133",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02133",
|
||
"Impact": "Low",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02138",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02138",
|
||
"Impact": "High",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02370",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02370",
|
||
"Impact": "Low",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02373",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02373",
|
||
"Impact": "Low",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02956",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02956",
|
||
"Impact": "High",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02988",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02988",
|
||
"Impact": "High",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03073",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-357, CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03073",
|
||
"Impact": "High",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03074",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-254, CWE-565",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03074",
|
||
"Impact": "Low",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03075",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-200, CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03075",
|
||
"Impact": "High",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03076",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03076",
|
||
"Impact": "High",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03077",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264, CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03077",
|
||
"Impact": "High",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04062",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04062",
|
||
"Impact": "Low",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04065",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-393",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04065",
|
||
"Impact": "Low",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04243",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04243",
|
||
"Impact": "Low",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04348",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04348",
|
||
"Impact": "Low",
|
||
"Public": "20220503"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04377",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04377",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04378",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04378",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04379",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-94",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04379",
|
||
"Impact": "Low",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04380",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-22",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04380",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04381",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04381",
|
||
"Impact": "Low",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04382",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-829",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04382",
|
||
"Impact": "Low",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04383",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04383",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04384",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-829",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04384",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04429",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-457",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04429",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04438",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04438",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04442",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04442",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04557",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04557",
|
||
"Impact": "High",
|
||
"Public": "20220531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04618",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04618",
|
||
"Impact": "Low",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04769",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04769",
|
||
"Impact": "High",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04776",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04776",
|
||
"Impact": "High",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04778",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04778",
|
||
"Impact": "Low",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05101",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05101",
|
||
"Impact": "Low",
|
||
"Public": "20220405"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05298",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05298",
|
||
"Impact": "Low",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05446",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05446",
|
||
"Impact": "High",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05447",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05447",
|
||
"Impact": "High",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05497",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05497",
|
||
"Impact": "High",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05560",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05560",
|
||
"Impact": "Low",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05566",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-356",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05566",
|
||
"Impact": "High",
|
||
"Public": "20220823"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05607",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05607",
|
||
"Impact": "High",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05748",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05748",
|
||
"Impact": "High",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05989",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05989",
|
||
"Impact": "Low",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06030",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06030",
|
||
"Impact": "Low",
|
||
"Public": "20211102"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06049",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06049",
|
||
"Impact": "High",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06059",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-428",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06059",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06106",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06106",
|
||
"Impact": "Low",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06107",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06107",
|
||
"Impact": "Low",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06108",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06108",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06109",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06109",
|
||
"Impact": "Low",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06140",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-939",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06140",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06141",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06141",
|
||
"Impact": "Low",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06142",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-644",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06142",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06144",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-664",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06144",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06166",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06166",
|
||
"Impact": "Low",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06186",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-208",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06186",
|
||
"Impact": "Low",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06198",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-254, CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06198",
|
||
"Impact": "Low",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06205",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
|
||
"CWE": "CWE-20, CWE-240",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06205",
|
||
"Impact": "Low",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06240",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-254, CWE-784",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06240",
|
||
"Impact": "Low",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06252",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06252",
|
||
"Impact": "High",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06253",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-254, CWE-1021",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06253",
|
||
"Impact": "High",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07017",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-121",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07017",
|
||
"Impact": "High",
|
||
"Public": "20220920"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01268",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01268",
|
||
"Impact": "High",
|
||
"Public": "20230215"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02697",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02697",
|
||
"Impact": "High",
|
||
"Public": "20230411"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02783",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02783",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2021-30547",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30547",
|
||
"Impact": "High",
|
||
"Public": "20210615"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38503",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38503",
|
||
"Impact": "Critical",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38504",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38504",
|
||
"Impact": "High",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38505",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38505",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38506",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38506",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38507",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38507",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38508",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38508",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38509",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38509",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38510",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38510",
|
||
"Impact": "High",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4129",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4129",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4140",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-91",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4140",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43531",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43531",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43532",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43532",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43533",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43533",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43534",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43534",
|
||
"Impact": "High",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43536",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43536",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43537",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43537",
|
||
"Impact": "High",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43538",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43538",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43539",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43539",
|
||
"Impact": "High",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43540",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43540",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43541",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43541",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43542",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-209",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43542",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43543",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43543",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43544",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43544",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43545",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-834",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43545",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43546",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43546",
|
||
"Impact": "Low",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0511",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0511",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0843",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0843",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1097",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1097",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1529",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-1321",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1529",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1802",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-1321",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1802",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1919",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1919",
|
||
"Impact": "High",
|
||
"Public": "20220728"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2200",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-1321",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2200",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22736",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-427",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22736",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22737",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22737",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22738",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22738",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22739",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22739",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22740",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22740",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22741",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22741",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22742",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22742",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22743",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22743",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22744",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-116",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22744",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22745",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22745",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22746",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22746",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22747",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-295",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22747",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22748",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22748",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22749",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22749",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22750",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22750",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22751",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22751",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22752",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22752",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22753",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22753",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22754",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22754",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22755",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-672",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22755",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22756",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22756",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22757",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22757",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22758",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-319",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22758",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22759",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22759",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22760",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-209",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22760",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22761",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22761",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22762",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22762",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22763",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22763",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-22764",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-22764",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24713",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-1333",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713",
|
||
"Impact": "High",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2505",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2505",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26381",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26381",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26382",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26382",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26383",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26383",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26384",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26384",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26385",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26385",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26387",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26387",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26485",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26485",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26486",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26486",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28281",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28281",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28282",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28282",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28283",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28283",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28284",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28284",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28285",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28285",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28286",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28286",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28287",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28287",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28288",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28288",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28289",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28289",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29909",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29909",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29910",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29910",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29911",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-1021",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29911",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29912",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29912",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29914",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29914",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29915",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29915",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29916",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29916",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29917",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29917",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29918",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29918",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31736",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31736",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31737",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31737",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31738",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31738",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31739",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31739",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31740",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31740",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31741",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31741",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31742",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31742",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31743",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31743",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31744",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31744",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31745",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31745",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31747",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31747",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31748",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31748",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3266",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3266",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34468",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34468",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34469",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-295",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34469",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34470",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34470",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34471",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34471",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34472",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34472",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34473",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34473",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34474",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34474",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34475",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34475",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34476",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34476",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34477",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34477",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34478",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34478",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34479",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34479",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34480",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-824",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34480",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34481",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34481",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34482",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34482",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34483",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34483",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34484",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34484",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34485",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34485",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36314",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-427",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36314",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36315",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36315",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36316",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-601",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36316",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36317",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36317",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36318",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36318",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36319",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36319",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36320",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36320",
|
||
"Impact": "Critical",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38472",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38472",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38473",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38473",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38474",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38474",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38475",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38475",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38476",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38476",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38477",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38477",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38478",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38478",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40956",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40956",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40957",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40957",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40958",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40958",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40959",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-922",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40959",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40960",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40960",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40961",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40961",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40962",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40962",
|
||
"Impact": "High",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-46880",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-46880",
|
||
"Impact": "Low",
|
||
"Public": "20221222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1945",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1945",
|
||
"Impact": "Low",
|
||
"Public": "20230602"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-25746",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25746",
|
||
"Impact": "High",
|
||
"Public": "20230602"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "43733",
|
||
"Href": "https://bugzilla.altlinux.org/43733",
|
||
"Data": "Перенести firefox-wayland в firefox"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231139001",
|
||
"Comment": "firefox is earlier than 0:105.0.1-alt0.c9.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20231139002",
|
||
"Comment": "firefox-config-privacy is earlier than 0:105.0.1-alt0.c9.1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |