{"vuid":"VU#670446","idnumber":"670446","name":"YETI","keywords":null,"overview":"### Overview\r\nVulnote test\r\n\r\n### Description\r\nTesting bleach upgrade <a onclick=\"dosomething()\">test test</a>\r\n\r\n### Impact\r\nThe complete impact of this vulnerability is not yet known.\r\n\r\n### Solution\r\nThe CERT/CC is currently unaware of a practical solution to this problem.\r\n\r\n### Acknowledgements\r\nThanks to the reporter who wishes to remain anonymous.","clean_desc":null,"impact":null,"resolution":null,"workarounds":null,"sysaffected":null,"thanks":null,"author":null,"public":[""],"cveids":["CVE-2022-0142"],"certadvisory":null,"uscerttechnicalalert":null,"datecreated":"2022-03-01T20:29:11.153501Z","publicdate":"2022-02-03T05:00:00Z","datefirstpublished":"2022-03-01T20:29:11.182842Z","dateupdated":"2022-09-06T20:18:46.372773Z","revision":4,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":null,"cvss_basevector":null,"cvss_temporalscore":null,"cvss_environmentalscore":null,"cvss_environmentalvector":null,"metric":null,"vulnote":3}