{"vulnerability": "CVE-2022-2163", "sightings": [{"uuid": "fc56e2e5-8afe-41a1-8255-107df8c757a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21636", "type": "seen", "source": "https://t.me/cibsecurity/51705", "content": "\u203c CVE-2022-21636 \u203c\n\nVulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Session Management). Supported versions that are affected are 12.2.6-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:14:31.000000Z"}, {"uuid": "ceeada2b-1486-43c4-9b79-b8d2ef237e97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21634", "type": "seen", "source": "https://t.me/cibsecurity/51699", "content": "\u203c CVE-2022-21634 \u203c\n\nVulnerability in the Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: LLVM Interpreter). Supported versions that are affected are Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:14:25.000000Z"}, {"uuid": "ecb18e4e-4a3d-4545-907c-1c72631b4b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21637", "type": "seen", "source": "https://t.me/cibsecurity/51722", "content": "\u203c CVE-2022-21637 \u203c\n\nVulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:36.000000Z"}, {"uuid": "20ced75a-629f-4e9f-bc6b-fb696ebf4d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21630", "type": "seen", "source": "https://t.me/cibsecurity/51717", "content": "\u203c CVE-2022-21630 \u203c\n\nVulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:30.000000Z"}, {"uuid": "960bcd57-b22c-4767-9058-c84bf6ef19cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21631", "type": "seen", "source": "https://t.me/cibsecurity/51707", "content": "\u203c CVE-2022-21631 \u203c\n\nVulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Design Tools SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:14:36.000000Z"}, {"uuid": "36145454-9e7d-4bda-852c-0064f296d240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21633", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5993", "content": "|       PRION:CVE-2023-22110    3.3     https://vulners.com/prion/PRION:CVE-2023-22110              |       PRION:CVE-2023-22104    3.3     https://vulners.com/prion/PRION:CVE-2023-22104              |       PRION:CVE-2023-22103    3.3     https://vulners.com/prion/PRION:CVE-2023-22103              |       PRION:CVE-2023-22097    3.3     https://vulners.com/prion/PRION:CVE-2023-22097              |       PRION:CVE-2023-22092    3.3     https://vulners.com/prion/PRION:CVE-2023-22092              |       PRION:CVE-2023-22084    3.3     https://vulners.com/prion/PRION:CVE-2023-22084              |       PRION:CVE-2023-22078    3.3     https://vulners.com/prion/PRION:CVE-2023-22078              |       PRION:CVE-2023-22070    3.3     https://vulners.com/prion/PRION:CVE-2023-22070              |       PRION:CVE-2023-22068    3.3     https://vulners.com/prion/PRION:CVE-2023-22068              |       PRION:CVE-2023-22066    3.3     https://vulners.com/prion/PRION:CVE-2023-22066              |       PRION:CVE-2023-22065    3.3     https://vulners.com/prion/PRION:CVE-2023-22065              |       PRION:CVE-2023-22064    3.3     https://vulners.com/prion/PRION:CVE-2023-22064              |       PRION:CVE-2023-22057    3.3     https://vulners.com/prion/PRION:CVE-2023-22057              |       PRION:CVE-2023-22056    3.3     https://vulners.com/prion/PRION:CVE-2023-22056              |       PRION:CVE-2023-22054    3.3     https://vulners.com/prion/PRION:CVE-2023-22054              |       PRION:CVE-2023-22032    3.3     https://vulners.com/prion/PRION:CVE-2023-22032\n|       PRION:CVE-2023-22028    3.3     https://vulners.com/prion/PRION:CVE-2023-22028              |       PRION:CVE-2023-22026    3.3     https://vulners.com/prion/PRION:CVE-2023-22026\n|       PRION:CVE-2023-22015    3.3     https://vulners.com/prion/PRION:CVE-2023-22015\n|       PRION:CVE-2023-22007    3.3     https://vulners.com/prion/PRION:CVE-2023-22007              |       PRION:CVE-2023-21982    3.3     https://vulners.com/prion/PRION:CVE-2023-21982              |       PRION:CVE-2023-21976    3.3     https://vulners.com/prion/PRION:CVE-2023-21976\n|       PRION:CVE-2023-21972    3.3     https://vulners.com/prion/PRION:CVE-2023-21972\n|       PRION:CVE-2023-21950    3.3     https://vulners.com/prion/PRION:CVE-2023-21950\n|       PRION:CVE-2023-21887    3.3     https://vulners.com/prion/PRION:CVE-2023-21887\n|       PRION:CVE-2023-21883    3.3     https://vulners.com/prion/PRION:CVE-2023-21883\n|       PRION:CVE-2023-21882    3.3     https://vulners.com/prion/PRION:CVE-2023-21882              |       PRION:CVE-2023-21881    3.3     https://vulners.com/prion/PRION:CVE-2023-21881\n|       PRION:CVE-2023-21879    3.3     https://vulners.com/prion/PRION:CVE-2023-21879\n|       PRION:CVE-2023-21878    3.3     https://vulners.com/prion/PRION:CVE-2023-21878              |       PRION:CVE-2023-21876    3.3     https://vulners.com/prion/PRION:CVE-2023-21876              |       PRION:CVE-2022-39400    3.3     https://vulners.com/prion/PRION:CVE-2022-39400\n|       PRION:CVE-2022-21641    3.3     https://vulners.com/prion/PRION:CVE-2022-21641\n|       PRION:CVE-2022-21640    3.3     https://vulners.com/prion/PRION:CVE-2022-21640\n|       PRION:CVE-2022-21638    3.3     https://vulners.com/prion/PRION:CVE-2022-21638\n|       PRION:CVE-2022-21637    3.3     https://vulners.com/prion/PRION:CVE-2022-21637              |       PRION:CVE-2022-21633    3.3     https://vulners.com/prion/PRION:CVE-2022-21633\n|       PRION:CVE-2022-21632    3.3     https://vulners.com/prion/PRION:CVE-2022-21632\n|       PRION:CVE-2022-21617    3.3     https://vulners.com/prion/PRION:CVE-2022-21617              |       PRION:CVE-2022-21608    3.3     https://vulners.com/prion/PRION:CVE-2022-21608              |       PRION:CVE-2022-21607    3.3     https://vulners.com/prion/PRION:CVE-2022-21607", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}, {"uuid": "d370c2a6-6035-4486-b80b-339aedbb160a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21637", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5993", "content": "|       PRION:CVE-2023-22110    3.3     https://vulners.com/prion/PRION:CVE-2023-22110              |       PRION:CVE-2023-22104    3.3     https://vulners.com/prion/PRION:CVE-2023-22104              |       PRION:CVE-2023-22103    3.3     https://vulners.com/prion/PRION:CVE-2023-22103              |       PRION:CVE-2023-22097    3.3     https://vulners.com/prion/PRION:CVE-2023-22097              |       PRION:CVE-2023-22092    3.3     https://vulners.com/prion/PRION:CVE-2023-22092              |       PRION:CVE-2023-22084    3.3     https://vulners.com/prion/PRION:CVE-2023-22084              |       PRION:CVE-2023-22078    3.3     https://vulners.com/prion/PRION:CVE-2023-22078              |       PRION:CVE-2023-22070    3.3     https://vulners.com/prion/PRION:CVE-2023-22070              |       PRION:CVE-2023-22068    3.3     https://vulners.com/prion/PRION:CVE-2023-22068              |       PRION:CVE-2023-22066    3.3     https://vulners.com/prion/PRION:CVE-2023-22066              |       PRION:CVE-2023-22065    3.3     https://vulners.com/prion/PRION:CVE-2023-22065              |       PRION:CVE-2023-22064    3.3     https://vulners.com/prion/PRION:CVE-2023-22064              |       PRION:CVE-2023-22057    3.3     https://vulners.com/prion/PRION:CVE-2023-22057              |       PRION:CVE-2023-22056    3.3     https://vulners.com/prion/PRION:CVE-2023-22056              |       PRION:CVE-2023-22054    3.3     https://vulners.com/prion/PRION:CVE-2023-22054              |       PRION:CVE-2023-22032    3.3     https://vulners.com/prion/PRION:CVE-2023-22032\n|       PRION:CVE-2023-22028    3.3     https://vulners.com/prion/PRION:CVE-2023-22028              |       PRION:CVE-2023-22026    3.3     https://vulners.com/prion/PRION:CVE-2023-22026\n|       PRION:CVE-2023-22015    3.3     https://vulners.com/prion/PRION:CVE-2023-22015\n|       PRION:CVE-2023-22007    3.3     https://vulners.com/prion/PRION:CVE-2023-22007              |       PRION:CVE-2023-21982    3.3     https://vulners.com/prion/PRION:CVE-2023-21982              |       PRION:CVE-2023-21976    3.3     https://vulners.com/prion/PRION:CVE-2023-21976\n|       PRION:CVE-2023-21972    3.3     https://vulners.com/prion/PRION:CVE-2023-21972\n|       PRION:CVE-2023-21950    3.3     https://vulners.com/prion/PRION:CVE-2023-21950\n|       PRION:CVE-2023-21887    3.3     https://vulners.com/prion/PRION:CVE-2023-21887\n|       PRION:CVE-2023-21883    3.3     https://vulners.com/prion/PRION:CVE-2023-21883\n|       PRION:CVE-2023-21882    3.3     https://vulners.com/prion/PRION:CVE-2023-21882              |       PRION:CVE-2023-21881    3.3     https://vulners.com/prion/PRION:CVE-2023-21881\n|       PRION:CVE-2023-21879    3.3     https://vulners.com/prion/PRION:CVE-2023-21879\n|       PRION:CVE-2023-21878    3.3     https://vulners.com/prion/PRION:CVE-2023-21878              |       PRION:CVE-2023-21876    3.3     https://vulners.com/prion/PRION:CVE-2023-21876              |       PRION:CVE-2022-39400    3.3     https://vulners.com/prion/PRION:CVE-2022-39400\n|       PRION:CVE-2022-21641    3.3     https://vulners.com/prion/PRION:CVE-2022-21641\n|       PRION:CVE-2022-21640    3.3     https://vulners.com/prion/PRION:CVE-2022-21640\n|       PRION:CVE-2022-21638    3.3     https://vulners.com/prion/PRION:CVE-2022-21638\n|       PRION:CVE-2022-21637    3.3     https://vulners.com/prion/PRION:CVE-2022-21637              |       PRION:CVE-2022-21633    3.3     https://vulners.com/prion/PRION:CVE-2022-21633\n|       PRION:CVE-2022-21632    3.3     https://vulners.com/prion/PRION:CVE-2022-21632\n|       PRION:CVE-2022-21617    3.3     https://vulners.com/prion/PRION:CVE-2022-21617              |       PRION:CVE-2022-21608    3.3     https://vulners.com/prion/PRION:CVE-2022-21608              |       PRION:CVE-2022-21607    3.3     https://vulners.com/prion/PRION:CVE-2022-21607", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}, {"uuid": "d2570f3d-cf64-42cc-9d6f-080691c0fd6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21632", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5993", "content": "|       PRION:CVE-2023-22110    3.3     https://vulners.com/prion/PRION:CVE-2023-22110              |       PRION:CVE-2023-22104    3.3     https://vulners.com/prion/PRION:CVE-2023-22104              |       PRION:CVE-2023-22103    3.3     https://vulners.com/prion/PRION:CVE-2023-22103              |       PRION:CVE-2023-22097    3.3     https://vulners.com/prion/PRION:CVE-2023-22097              |       PRION:CVE-2023-22092    3.3     https://vulners.com/prion/PRION:CVE-2023-22092              |       PRION:CVE-2023-22084    3.3     https://vulners.com/prion/PRION:CVE-2023-22084              |       PRION:CVE-2023-22078    3.3     https://vulners.com/prion/PRION:CVE-2023-22078              |       PRION:CVE-2023-22070    3.3     https://vulners.com/prion/PRION:CVE-2023-22070              |       PRION:CVE-2023-22068    3.3     https://vulners.com/prion/PRION:CVE-2023-22068              |       PRION:CVE-2023-22066    3.3     https://vulners.com/prion/PRION:CVE-2023-22066              |       PRION:CVE-2023-22065    3.3     https://vulners.com/prion/PRION:CVE-2023-22065              |       PRION:CVE-2023-22064    3.3     https://vulners.com/prion/PRION:CVE-2023-22064              |       PRION:CVE-2023-22057    3.3     https://vulners.com/prion/PRION:CVE-2023-22057              |       PRION:CVE-2023-22056    3.3     https://vulners.com/prion/PRION:CVE-2023-22056              |       PRION:CVE-2023-22054    3.3     https://vulners.com/prion/PRION:CVE-2023-22054              |       PRION:CVE-2023-22032    3.3     https://vulners.com/prion/PRION:CVE-2023-22032\n|       PRION:CVE-2023-22028    3.3     https://vulners.com/prion/PRION:CVE-2023-22028              |       PRION:CVE-2023-22026    3.3     https://vulners.com/prion/PRION:CVE-2023-22026\n|       PRION:CVE-2023-22015    3.3     https://vulners.com/prion/PRION:CVE-2023-22015\n|       PRION:CVE-2023-22007    3.3     https://vulners.com/prion/PRION:CVE-2023-22007              |       PRION:CVE-2023-21982    3.3     https://vulners.com/prion/PRION:CVE-2023-21982              |       PRION:CVE-2023-21976    3.3     https://vulners.com/prion/PRION:CVE-2023-21976\n|       PRION:CVE-2023-21972    3.3     https://vulners.com/prion/PRION:CVE-2023-21972\n|       PRION:CVE-2023-21950    3.3     https://vulners.com/prion/PRION:CVE-2023-21950\n|       PRION:CVE-2023-21887    3.3     https://vulners.com/prion/PRION:CVE-2023-21887\n|       PRION:CVE-2023-21883    3.3     https://vulners.com/prion/PRION:CVE-2023-21883\n|       PRION:CVE-2023-21882    3.3     https://vulners.com/prion/PRION:CVE-2023-21882              |       PRION:CVE-2023-21881    3.3     https://vulners.com/prion/PRION:CVE-2023-21881\n|       PRION:CVE-2023-21879    3.3     https://vulners.com/prion/PRION:CVE-2023-21879\n|       PRION:CVE-2023-21878    3.3     https://vulners.com/prion/PRION:CVE-2023-21878              |       PRION:CVE-2023-21876    3.3     https://vulners.com/prion/PRION:CVE-2023-21876              |       PRION:CVE-2022-39400    3.3     https://vulners.com/prion/PRION:CVE-2022-39400\n|       PRION:CVE-2022-21641    3.3     https://vulners.com/prion/PRION:CVE-2022-21641\n|       PRION:CVE-2022-21640    3.3     https://vulners.com/prion/PRION:CVE-2022-21640\n|       PRION:CVE-2022-21638    3.3     https://vulners.com/prion/PRION:CVE-2022-21638\n|       PRION:CVE-2022-21637    3.3     https://vulners.com/prion/PRION:CVE-2022-21637              |       PRION:CVE-2022-21633    3.3     https://vulners.com/prion/PRION:CVE-2022-21633\n|       PRION:CVE-2022-21632    3.3     https://vulners.com/prion/PRION:CVE-2022-21632\n|       PRION:CVE-2022-21617    3.3     https://vulners.com/prion/PRION:CVE-2022-21617              |       PRION:CVE-2022-21608    3.3     https://vulners.com/prion/PRION:CVE-2022-21608              |       PRION:CVE-2022-21607    3.3     https://vulners.com/prion/PRION:CVE-2022-21607", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}, {"uuid": "ddc7d7fa-e43e-4f20-b7f8-14b2045741da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21638", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5993", "content": "|       PRION:CVE-2023-22110    3.3     https://vulners.com/prion/PRION:CVE-2023-22110              |       PRION:CVE-2023-22104    3.3     https://vulners.com/prion/PRION:CVE-2023-22104              |       PRION:CVE-2023-22103    3.3     https://vulners.com/prion/PRION:CVE-2023-22103              |       PRION:CVE-2023-22097    3.3     https://vulners.com/prion/PRION:CVE-2023-22097              |       PRION:CVE-2023-22092    3.3     https://vulners.com/prion/PRION:CVE-2023-22092              |       PRION:CVE-2023-22084    3.3     https://vulners.com/prion/PRION:CVE-2023-22084              |       PRION:CVE-2023-22078    3.3     https://vulners.com/prion/PRION:CVE-2023-22078              |       PRION:CVE-2023-22070    3.3     https://vulners.com/prion/PRION:CVE-2023-22070              |       PRION:CVE-2023-22068    3.3     https://vulners.com/prion/PRION:CVE-2023-22068              |       PRION:CVE-2023-22066    3.3     https://vulners.com/prion/PRION:CVE-2023-22066              |       PRION:CVE-2023-22065    3.3     https://vulners.com/prion/PRION:CVE-2023-22065              |       PRION:CVE-2023-22064    3.3     https://vulners.com/prion/PRION:CVE-2023-22064              |       PRION:CVE-2023-22057    3.3     https://vulners.com/prion/PRION:CVE-2023-22057              |       PRION:CVE-2023-22056    3.3     https://vulners.com/prion/PRION:CVE-2023-22056              |       PRION:CVE-2023-22054    3.3     https://vulners.com/prion/PRION:CVE-2023-22054              |       PRION:CVE-2023-22032    3.3     https://vulners.com/prion/PRION:CVE-2023-22032\n|       PRION:CVE-2023-22028    3.3     https://vulners.com/prion/PRION:CVE-2023-22028              |       PRION:CVE-2023-22026    3.3     https://vulners.com/prion/PRION:CVE-2023-22026\n|       PRION:CVE-2023-22015    3.3     https://vulners.com/prion/PRION:CVE-2023-22015\n|       PRION:CVE-2023-22007    3.3     https://vulners.com/prion/PRION:CVE-2023-22007              |       PRION:CVE-2023-21982    3.3     https://vulners.com/prion/PRION:CVE-2023-21982              |       PRION:CVE-2023-21976    3.3     https://vulners.com/prion/PRION:CVE-2023-21976\n|       PRION:CVE-2023-21972    3.3     https://vulners.com/prion/PRION:CVE-2023-21972\n|       PRION:CVE-2023-21950    3.3     https://vulners.com/prion/PRION:CVE-2023-21950\n|       PRION:CVE-2023-21887    3.3     https://vulners.com/prion/PRION:CVE-2023-21887\n|       PRION:CVE-2023-21883    3.3     https://vulners.com/prion/PRION:CVE-2023-21883\n|       PRION:CVE-2023-21882    3.3     https://vulners.com/prion/PRION:CVE-2023-21882              |       PRION:CVE-2023-21881    3.3     https://vulners.com/prion/PRION:CVE-2023-21881\n|       PRION:CVE-2023-21879    3.3     https://vulners.com/prion/PRION:CVE-2023-21879\n|       PRION:CVE-2023-21878    3.3     https://vulners.com/prion/PRION:CVE-2023-21878              |       PRION:CVE-2023-21876    3.3     https://vulners.com/prion/PRION:CVE-2023-21876              |       PRION:CVE-2022-39400    3.3     https://vulners.com/prion/PRION:CVE-2022-39400\n|       PRION:CVE-2022-21641    3.3     https://vulners.com/prion/PRION:CVE-2022-21641\n|       PRION:CVE-2022-21640    3.3     https://vulners.com/prion/PRION:CVE-2022-21640\n|       PRION:CVE-2022-21638    3.3     https://vulners.com/prion/PRION:CVE-2022-21638\n|       PRION:CVE-2022-21637    3.3     https://vulners.com/prion/PRION:CVE-2022-21637              |       PRION:CVE-2022-21633    3.3     https://vulners.com/prion/PRION:CVE-2022-21633\n|       PRION:CVE-2022-21632    3.3     https://vulners.com/prion/PRION:CVE-2022-21632\n|       PRION:CVE-2022-21617    3.3     https://vulners.com/prion/PRION:CVE-2022-21617              |       PRION:CVE-2022-21608    3.3     https://vulners.com/prion/PRION:CVE-2022-21608              |       PRION:CVE-2022-21607    3.3     https://vulners.com/prion/PRION:CVE-2022-21607", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}, {"uuid": "2990ab3b-d89a-4cff-8d32-85b6f1ccb405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2163", "type": "seen", "source": "https://t.me/true_secator/3090", "content": "\u041d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e Chrome 103,\n\u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0432 14 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u0438\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2022-2156 \u0432 Base, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438. \n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u041c\u0430\u0440\u043a \u0411\u0440\u044d\u043d\u0434 \u0438\u0437 Google Project Zero.\n\n\u0412 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0448\u0438\u0431\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u0445\u043e\u0434\u0443 \u0438\u0437 \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u0438\u043b\u0438 \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u0412 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Chrome 103 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0442\u0430\u043a\u0436\u0435 \u0442\u0440\u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0435 \u043d\u0430 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b:\n\n- Interest groups (CVE-2022-2157, \u0432\u044b\u0441\u043e\u043a\u0430\u044f \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u041d\u0430\u043d \u0412\u0430\u043d \u0438 \u0413\u0443\u0430\u043d \u0413\u0443\u043d \u0438\u0437 360 Alpha Lab),\n- WebApp Provider (CVE-2022-2161, \u0441\u0440\u0435\u0434\u043d\u044f\u044f \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u0427\u0436\u0438\u0445\u0443\u0430 \u042f\u043e \u0438\u0437 KunLun Lab),\n- Cast UI and Toolbar (CVE-2022-2163, \u043d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c, \u0441\u043e\u043e\u0431\u0449\u0438\u043b \u0427\u0430\u043e\u044e\u0430\u043d\u044c \u041f\u044d\u043d).\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0435\u0439 \u0442\u0438\u043f\u043e\u0432 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8 JavaScript \u0438 WebAssembly - CVE-2022-2158, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0411\u043e\u0445\u0430\u043d \u041b\u044e \u0438\u0437 Tencent Security Xuanwu Lab.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0438 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u043f\u043e\u043b\u0438\u0442\u0438\u043a \u0432 DevTools (CVE-2022-2160), API \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b (CVE-2022-2162), \u043d\u0435\u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u0443\u044e \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0432 Extensions API (CVE-2022-2164 \u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0443\u044e \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 URL (CVE-2022-2165).\n\nGoogle \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u0432\u044b\u043f\u043b\u0430\u0442\u0438\u043b\u0430 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 44 000 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0421\u0428\u0410 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043e\u043a, \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043e\u0431 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u043d\u0435 \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a Chrome \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0434\u043b\u044f Windows, Mac \u0438 Linux \u043a\u0430\u043a \u0432\u0435\u0440\u0441\u0438\u044f 103.0.5060.53, \u0442\u0430\u043a \u0447\u0442\u043e \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2022-06-23T10:20:36.000000Z"}, {"uuid": "e32bc3bd-c380-43ba-8b32-cbd32f8e4426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2163", "type": "seen", "source": "https://t.me/true_secator/3200", "content": "Google \u00a0\u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Chrome 103, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0432 11 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435.\n\n\u041f\u044f\u0442\u044c \u0438\u0437 \u043d\u0438\u0445 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u0447\u0435\u0442\u044b\u0440\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 - CVE-2022-2477, CVE-2022-2478, CVE-2022-2480 \u0438 CVE-2022-2481.\n\n\u041e\u0448\u0438\u0431\u043a\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0442\u0441\u044f, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u043d\u0435 \u043e\u0447\u0438\u0449\u0430\u0435\u0442 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0442\u0430\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b, \u043a\u0430\u043a Guest View, PDF, Service Worker API \u0438 Views.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE, DoS \u0438\u043b\u0438 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445, \u043d\u043e, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0441\u043e\u0447\u0435\u0442\u0430\u044e\u0442\u0441\u044f \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438 - \u043a \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u0412 Chrome \u0438\u0445 \u043c\u043e\u0436\u043d\u043e \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u0445\u043e\u0434\u0430 \u0438\u0437 \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0432\u044b\u043f\u043b\u0430\u0442\u0438\u043b \u043f\u043e 16 000 \u0438 7 500 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u0434\u0432\u0435 \u043e\u0448\u0438\u0431\u043a\u0438, \u0441\u0443\u043c\u043c\u0430 \u043f\u043e \u0442\u0440\u0435\u0442\u044c\u0435\u0439 \u043f\u043e\u043a\u0430 \u043d\u0435 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0430, \u0430 \u0442\u0430\u043a\u0436\u0435 3000 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0437\u0430 CVE-2022-2479, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0445 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 File.\n\n\u0428\u0435\u0441\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0438\u0437\u0432\u043d\u0435, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0432 \u044d\u0442\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 Chrome, CVE-2022-2163, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043d\u0438\u0437\u043a\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u0438 \u0442\u0430\u043a\u0436\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u043c \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 Cast \u0438 \u043f\u0430\u043d\u0435\u043b\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432. \u0417\u0430 \u043d\u0435\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043b\u0430\u0447\u0435\u043d\u043e \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u0435 \u0432 \u0440\u0430\u0437\u043c\u0435\u0440\u0435 7000 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0421\u0428\u0410.\n\nGoogle \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u0438\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Windows, Mac \u0438 Linux \u043a\u0430\u043a \u0432\u0435\u0440\u0441\u0438\u044f 103.0.5060.134.", "creation_timestamp": "2022-07-21T11:55:49.000000Z"}]}