ID

VAR-202210-0043


CVE

CVE-2022-35256


TITLE

Node.js Foundation  of  Node.js  in products from other multiple vendors  HTTP  Request Smuggling Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-022575

DESCRIPTION

The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling. Node.js Foundation of Node.js For products from other vendors, HTTP There is a vulnerability related to request smuggling.Information may be obtained and information may be tampered with. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5326-1 security@debian.org https://www.debian.org/security/ Aron Xu January 24, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nodejs CVE ID : CVE-2022-32212 CVE-2022-32213 CVE-2022-32214 CVE-2022-32215 CVE-2022-35255 CVE-2022-35256 CVE-2022-43548 Multiple vulnerabilities were discovered in Node.js, which could result in HTTP request smuggling, bypass of host IP address validation and weak randomness setup. For the stable distribution (bullseye), these problems have been fixed in version 12.22.12~dfsg-1~deb11u3. We recommend that you upgrade your nodejs packages. For the detailed security status of nodejs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nodejs Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmPQNhIACgkQEMKTtsN8 TjaRmA/+KDFkQcd2sE/eAAx9cVikICNkfu7uIVKHpeDH9o5oq5M2nj4zHJCeAArp WblguyZwEtqzAOO2WesbrmwfXLmglhrNZwRMOrsbu63JxSnecp7qcMwR8A4JWdmd Txb4aZr6Prmwq6fT0G3K6oV8Hw+OeqYA/RZKenxtkBf/jdzVahGJHJ/NrFKKWVQW xbqHwCkP7uUlm+5UR5XzNrodTRCQYHJvUmDUrjEOjM6x+sqYirKWiERN0A14kVn9 0Ufrw6+Z2tKhdKFZfU1BtDthhlH/nybz0h3aHsk+E5/vx20WAURiCEDVi7nf8+Rf EtbCxaqV+/xVoPmXStHY/ogCo8CgRVsyYUIemgi4q5LwVx/Oqjm2CJ/xCwOKh0E2 idXLJfLSpxxBe598MUn9iKbnFFCN9DQZXf7BYs3djtn8ALFVBSHZSF1QXFoFQ86w Y9xGhBQzfEgCoEW7H4S30ZQ+Gz+ZnOMCSH+MKIMtSpqbc7wLtrKf839DO6Uux7B7 u0WR3lZlsihi92QKq9X/VRkyy8ZiA2TYy3IE+KDKlXDHKls9FR9BUClYe9L8RiRu boP8KPFUHUsSVaTzkufMStdKkcXCqgj/6KhJL6E9ZunTBpTmqx1Ty7/N2qktLFnH ujrffzV3rCE6eIg7ps8OdZbjCfqUqmQk9/pV6ZDjymqjZ1LKZDs\xfeRn -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Advisory ID: RHSA-2023:0321-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:0321 Issue date: 2023-01-23 CVE Names: CVE-2021-44906 CVE-2022-3517 CVE-2022-35256 CVE-2022-43548 ==================================================================== 1. Summary: An update for nodejs and nodejs-nodemon is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs: Packaged version of undici does not fit with declared version. [rhel-9] (BZ#2151627) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2066009 - CVE-2021-44906 minimist: prototype pollution 2130518 - CVE-2022-35256 nodejs: HTTP Request Smuggling due to incorrect parsing of header fields 2134609 - CVE-2022-3517 nodejs-minimatch: ReDoS via the braceExpand function 2140911 - CVE-2022-43548 nodejs: DNS rebinding in inspect via invalid octal IP address 2142808 - nodejs: Rebase to the latest Nodejs 16 release [rhel-9] [rhel-9.1.0.z] 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): Source: nodejs-16.18.1-3.el9_1.src.rpm nodejs-nodemon-2.0.20-2.el9_1.src.rpm aarch64: nodejs-16.18.1-3.el9_1.aarch64.rpm nodejs-debuginfo-16.18.1-3.el9_1.aarch64.rpm nodejs-debugsource-16.18.1-3.el9_1.aarch64.rpm nodejs-full-i18n-16.18.1-3.el9_1.aarch64.rpm nodejs-libs-16.18.1-3.el9_1.aarch64.rpm nodejs-libs-debuginfo-16.18.1-3.el9_1.aarch64.rpm npm-8.19.2-1.16.18.1.3.el9_1.aarch64.rpm noarch: nodejs-docs-16.18.1-3.el9_1.noarch.rpm nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm ppc64le: nodejs-16.18.1-3.el9_1.ppc64le.rpm nodejs-debuginfo-16.18.1-3.el9_1.ppc64le.rpm nodejs-debugsource-16.18.1-3.el9_1.ppc64le.rpm nodejs-full-i18n-16.18.1-3.el9_1.ppc64le.rpm nodejs-libs-16.18.1-3.el9_1.ppc64le.rpm nodejs-libs-debuginfo-16.18.1-3.el9_1.ppc64le.rpm npm-8.19.2-1.16.18.1.3.el9_1.ppc64le.rpm s390x: nodejs-16.18.1-3.el9_1.s390x.rpm nodejs-debuginfo-16.18.1-3.el9_1.s390x.rpm nodejs-debugsource-16.18.1-3.el9_1.s390x.rpm nodejs-full-i18n-16.18.1-3.el9_1.s390x.rpm nodejs-libs-16.18.1-3.el9_1.s390x.rpm nodejs-libs-debuginfo-16.18.1-3.el9_1.s390x.rpm npm-8.19.2-1.16.18.1.3.el9_1.s390x.rpm x86_64: nodejs-16.18.1-3.el9_1.x86_64.rpm nodejs-debuginfo-16.18.1-3.el9_1.i686.rpm nodejs-debuginfo-16.18.1-3.el9_1.x86_64.rpm nodejs-debugsource-16.18.1-3.el9_1.i686.rpm nodejs-debugsource-16.18.1-3.el9_1.x86_64.rpm nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpm nodejs-libs-16.18.1-3.el9_1.i686.rpm nodejs-libs-16.18.1-3.el9_1.x86_64.rpm nodejs-libs-debuginfo-16.18.1-3.el9_1.i686.rpm nodejs-libs-debuginfo-16.18.1-3.el9_1.x86_64.rpm npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-44906 https://access.redhat.com/security/cve/CVE-2022-3517 https://access.redhat.com/security/cve/CVE-2022-35256 https://access.redhat.com/security/cve/CVE-2022-43548 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY863QtzjgjWX9erEAQjyEA//WIc1iuAyIQ3WtaxF0X/21hjWryEendA0 d+KAshzQdwEOgDqRyiLHCW/F4W57Y9Us7Fm/RK76k8ux0Hy61T0lqxrFr1DRyAvH tkkyZMB00S86Cn39fPM7mr6te5LuXAFCUbPumNMivhZ2Xn3NTvZAbcgqIklsGwcI kBVRASVut5q7mcwtA89ycJ5xBDhkECLj8ZgRklGs3FGZ5fp4E7+oTiphlOdOuHNg qKac9z2pwMuZ4DC0sUoFVKCS06XWhwuKtw0py64FbNI3WrE3h4uAhnJJXBLh0lhx 3TNXuOu/9Fs1S+uP/GpO93ZX181P448QGLWnjnBlYpN2rFI1iuZ0rd3LMlsYiXEp CPawjyNLV69SHfkw1+8vg+XPC9lt96ZFSXFVlfKorwWADBAU1Op6VZKYo5POHpmS MborNXzXPc9TsVyx67ooW+0n5r/K5PTIjJ/6fCrifSBLlINIk5iZ07zUkgRHBAsX jVtIhaTxOrE4VMlPZRV2M+LBfCnUvOeuRlfW1f91Vf+fpg0b2JNgXzBvAbIHRcEp HfOgd7XYNe+aCYCm9quXcQjgaRmFVmLb6iSLvc69I8pfIbJNd5i1GhLQlUUlogrp Sab/YOzQHOchkMZ5QDjsy2l2O6ujZz+YHVNg0Xef+/ZGqDURe9lP7NdvdaUIKQ82 BG5rwd6T15Q=ZZyv -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.34

sources: NVD: CVE-2022-35256 // JVNDB: JVNDB-2022-022575 // VULMON: CVE-2022-35256 // PACKETSTORM: 169408 // PACKETSTORM: 168757 // PACKETSTORM: 170727 // PACKETSTORM: 170658 // PACKETSTORM: 169779 // PACKETSTORM: 171839 // PACKETSTORM: 171666

AFFECTED PRODUCTS

vendor:nodejsmodel:node.jsscope:gteversion:14.15.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:16.12.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:18.9.1

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:14.20.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:siemensmodel:sinec insscope:eqversion:1.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.13.0

Trust: 1.0

vendor:siemensmodel:sinec insscope:ltversion:1.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:14.14.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:14.0.0

Trust: 1.0

vendor:llhttpmodel:llhttpscope:ltversion:6.0.10

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:18.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:16.17.1

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.0.0

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:node jsmodel:node.jsscope: - version: -

Trust: 0.8

vendor:llhttpmodel:llhttpscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinec insscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-022575 // NVD: CVE-2022-35256

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-35256
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-35256
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-35256
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202210-1266
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-35256
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 2.0

NVD: CVE-2022-35256
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-022575 // CNNVD: CNNVD-202210-1266 // NVD: CVE-2022-35256 // NVD: CVE-2022-35256

PROBLEMTYPE DATA

problemtype:CWE-444

Trust: 1.0

problemtype:HTTP Request Smuggling (CWE-444) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-022575 // NVD: CVE-2022-35256

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-1266

TYPE

environmental issue

Trust: 0.6

sources: CNNVD: CNNVD-202210-1266

PATCH

title:Node.js Remediation measures for environmental problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=219729

Trust: 0.6

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-35256

Trust: 0.1

sources: VULMON: CVE-2022-35256 // CNNVD: CNNVD-202210-1266

EXTERNAL IDS

db:NVDid:CVE-2022-35256

Trust: 4.0

db:HACKERONEid:1675191

Trust: 2.4

db:SIEMENSid:SSA-332410

Trust: 2.4

db:ICS CERTid:ICSA-23-017-03

Trust: 0.8

db:JVNid:JVNVU90782730

Trust: 0.8

db:JVNDBid:JVNDB-2022-022575

Trust: 0.8

db:PACKETSTORMid:169408

Trust: 0.7

db:PACKETSTORMid:170727

Trust: 0.7

db:PACKETSTORMid:169781

Trust: 0.6

db:PACKETSTORMid:169437

Trust: 0.6

db:AUSCERTid:ESB-2022.6632

Trust: 0.6

db:AUSCERTid:ESB-2023.1926

Trust: 0.6

db:AUSCERTid:ESB-2022.5146

Trust: 0.6

db:CNNVDid:CNNVD-202210-1266

Trust: 0.6

db:VULMONid:CVE-2022-35256

Trust: 0.1

db:PACKETSTORMid:168757

Trust: 0.1

db:PACKETSTORMid:170658

Trust: 0.1

db:PACKETSTORMid:169779

Trust: 0.1

db:PACKETSTORMid:171839

Trust: 0.1

db:PACKETSTORMid:171666

Trust: 0.1

sources: VULMON: CVE-2022-35256 // PACKETSTORM: 169408 // PACKETSTORM: 168757 // PACKETSTORM: 170727 // PACKETSTORM: 170658 // PACKETSTORM: 169779 // PACKETSTORM: 171839 // PACKETSTORM: 171666 // JVNDB: JVNDB-2022-022575 // CNNVD: CNNVD-202210-1266 // NVD: CVE-2022-35256

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf

Trust: 2.4

url:https://hackerone.com/reports/1675191

Trust: 2.4

url:https://www.debian.org/security/2023/dsa-5326

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-35256

Trust: 1.5

url:https://jvn.jp/vu/jvnvu90782730/

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-017-03

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-35256

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://packetstormsecurity.com/files/170727/debian-security-advisory-5326-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169408/red-hat-security-advisory-2022-6963-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1926

Trust: 0.6

url:https://packetstormsecurity.com/files/169781/red-hat-security-advisory-2022-7830-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5146

Trust: 0.6

url:https://packetstormsecurity.com/files/169437/red-hat-security-advisory-2022-7044-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6632

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-35256/

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-35255

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-43548

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-35255

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-44906

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-3517

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-3517

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-43548

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-44906

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2023-23918

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-35065

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-35065

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-24999

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-24999

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-38900

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-4904

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-23920

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-4904

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-38900

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:6963

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32214

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32212

Trust: 0.1

url:https://security-tracker.debian.org/tracker/nodejs

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32213

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32215

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0321

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7821

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44531

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0235

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44533

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1742

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44532

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21824

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44532

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23918

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23920

Trust: 0.1

sources: VULMON: CVE-2022-35256 // PACKETSTORM: 169408 // PACKETSTORM: 168757 // PACKETSTORM: 170727 // PACKETSTORM: 170658 // PACKETSTORM: 169779 // PACKETSTORM: 171839 // PACKETSTORM: 171666 // JVNDB: JVNDB-2022-022575 // CNNVD: CNNVD-202210-1266 // NVD: CVE-2022-35256

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 169408 // PACKETSTORM: 168757 // PACKETSTORM: 170658 // PACKETSTORM: 169779 // PACKETSTORM: 171839 // PACKETSTORM: 171666

SOURCES

db:VULMONid:CVE-2022-35256
db:PACKETSTORMid:169408
db:PACKETSTORMid:168757
db:PACKETSTORMid:170727
db:PACKETSTORMid:170658
db:PACKETSTORMid:169779
db:PACKETSTORMid:171839
db:PACKETSTORMid:171666
db:JVNDBid:JVNDB-2022-022575
db:CNNVDid:CNNVD-202210-1266
db:NVDid:CVE-2022-35256

LAST UPDATE DATE

2025-06-26T20:16:47.882000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-022575date:2023-11-17T08:21:00
db:CNNVDid:CNNVD-202210-1266date:2023-04-04T00:00:00
db:NVDid:CVE-2022-35256date:2025-04-24T14:15:32.277

SOURCES RELEASE DATE

db:PACKETSTORMid:169408date:2022-10-18T22:30:35
db:PACKETSTORMid:168757date:2022-10-18T14:27:29
db:PACKETSTORMid:170727date:2023-01-25T16:09:12
db:PACKETSTORMid:170658date:2023-01-24T16:29:02
db:PACKETSTORMid:169779date:2022-11-08T13:50:31
db:PACKETSTORMid:171839date:2023-04-12T16:57:08
db:PACKETSTORMid:171666date:2023-04-03T17:32:27
db:JVNDBid:JVNDB-2022-022575date:2023-11-17T00:00:00
db:CNNVDid:CNNVD-202210-1266date:2022-10-18T00:00:00
db:NVDid:CVE-2022-35256date:2022-12-05T22:15:10.570