cvelist/2014/0xxx/CVE-2014-0114.json

388 lines
15 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-01-16 14:04:51 -05:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2014-0114",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2019Jan Changes to be committed: modified: 2014/0xxx/CVE-2014-0114.json modified: 2015/0xxx/CVE-2015-0852.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2015/8xxx/CVE-2015-8965.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/5xxx/CVE-2016-5684.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/9xxx/CVE-2016-9389.json modified: 2016/9xxx/CVE-2016-9392.json modified: 2016/9xxx/CVE-2016-9583.json modified: 2017/0xxx/CVE-2017-0379.json modified: 2017/13xxx/CVE-2017-13745.json modified: 2017/14xxx/CVE-2017-14229.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9526.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/0xxx/CVE-2018-0733.json modified: 2018/0xxx/CVE-2018-0734.json modified: 2018/0xxx/CVE-2018-0735.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/1000xxx/CVE-2018-1000120.json modified: 2018/1000xxx/CVE-2018-1000121.json modified: 2018/1000xxx/CVE-2018-1000122.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000300.json modified: 2018/1000xxx/CVE-2018-1000301.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/10xxx/CVE-2018-10933.json modified: 2018/11xxx/CVE-2018-11039.json modified: 2018/11xxx/CVE-2018-11040.json modified: 2018/11xxx/CVE-2018-11212.json modified: 2018/11xxx/CVE-2018-11763.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/11xxx/CVE-2018-11776.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/1xxx/CVE-2018-1257.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1270.json modified: 2018/1xxx/CVE-2018-1271.json modified: 2018/1xxx/CVE-2018-1272.json modified: 2018/1xxx/CVE-2018-1275.json modified: 2018/1xxx/CVE-2018-1313.json modified: 2018/3xxx/CVE-2018-3125.json modified: 2018/3xxx/CVE-2018-3147.json modified: 2018/3xxx/CVE-2018-3246.json modified: 2018/3xxx/CVE-2018-3303.json modified: 2018/3xxx/CVE-2018-3304.json modified: 2018/3xxx/CVE-2018-3305.json modified: 2018/3xxx/CVE-2018-3309.json modified: 2018/3xxx/CVE-2018-3311.json modified: 2018/3xxx/CVE-2018-3639.json modified: 2018/3xxx/CVE-2018-3646.json modified: 2018/5xxx/CVE-2018-5390.json modified: 2018/5xxx/CVE-2018-5407.json modified: 2018/6xxx/CVE-2018-6922.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/9xxx/CVE-2018-9206.json modified: 2019/2xxx/CVE-2019-2395.json modified: 2019/2xxx/CVE-2019-2396.json modified: 2019/2xxx/CVE-2019-2397.json modified: 2019/2xxx/CVE-2019-2398.json modified: 2019/2xxx/CVE-2019-2399.json modified: 2019/2xxx/CVE-2019-2400.json modified: 2019/2xxx/CVE-2019-2401.json modified: 2019/2xxx/CVE-2019-2402.json modified: 2019/2xxx/CVE-2019-2403.json modified: 2019/2xxx/CVE-2019-2404.json modified: 2019/2xxx/CVE-2019-2405.json modified: 2019/2xxx/CVE-2019-2406.json modified: 2019/2xxx/CVE-2019-2407.json modified: 2019/2xxx/CVE-2019-2408.json modified: 2019/2xxx/CVE-2019-2409.json modified: 2019/2xxx/CVE-2019-2410.json modified: 2019/2xxx/CVE-2019-2411.json modified: 2019/2xxx/CVE-2019-2412.json modified: 2019/2xxx/CVE-2019-2413.json modified: 2019/2xxx/CVE-2019-2414.json modified: 2019/2xxx/CVE-2019-2415.json modified: 2019/2xxx/CVE-2019-2416.json modified: 2019/2xxx/CVE-2019-2417.json modified: 2019/2xxx/CVE-2019-2418.json modified: 2019/2xxx/CVE-2019-2419.json modified: 2019/2xxx/CVE-2019-2420.json modified: 2019/2xxx/CVE-2019-2421.json modified: 2019/2xxx/CVE-2019-2422.json modified: 2019/2xxx/CVE-2019-2423.json modified: 2019/2xxx/CVE-2019-2425.json modified: 2019/2xxx/CVE-2019-2426.json modified: 2019/2xxx/CVE-2019-2427.json modified: 2019/2xxx/CVE-2019-2429.json modified: 2019/2xxx/CVE-2019-2430.json modified: 2019/2xxx/CVE-2019-2431.json modified: 2019/2xxx/CVE-2019-2432.json modified: 2019/2xxx/CVE-2019-2433.json modified: 2019/2xxx/CVE-2019-2434.json modified: 2019/2xxx/CVE-2019-2435.json modified: 2019/2xxx/CVE-2019-2436.json modified: 2019/2xxx/CVE-2019-2437.json modified: 2019/2xxx/CVE-2019-2438.json modified: 2019/2xxx/CVE-2019-2439.json modified: 2019/2xxx/CVE-2019-2440.json modified: 2019/2xxx/CVE-2019-2441.json modified: 2019/2xxx/CVE-2019-2442.json modified: 2019/2xxx/CVE-2019-2443.json modified: 2019/2xxx/CVE-2019-2444.json modified: 2019/2xxx/CVE-2019-2445.json modified: 2019/2xxx/CVE-2019-2446.json modified: 2019/2xxx/CVE-2019-2447.json modified: 2019/2xxx/CVE-2019-2448.json modified: 2019/2xxx/CVE-2019-2449.json modified: 2019/2xxx/CVE-2019-2450.json modified: 2019/2xxx/CVE-2019-2451.json modified: 2019/2xxx/CVE-2019-2452.json modified: 2019/2xxx/CVE-2019-2453.json modified: 2019/2xxx/CVE-2019-2455.json modified: 2019/2xxx/CVE-2019-2456.json modified: 2019/2xxx/CVE-2019-2457.json modified: 2019/2xxx/CVE-2019-2458.json modified: 2019/2xxx/CVE-2019-2459.json modified: 2019/2xxx/CVE-2019-2460.json modified: 2019/2xxx/CVE-2019-2461.json modified: 2019/2xxx/CVE-2019-2462.json modified: 2019/2xxx/CVE-2019-2463.json modified: 2019/2xxx/CVE-2019-2464.json modified: 2019/2xxx/CVE-2019-2465.json modified: 2019/2xxx/CVE-2019-2466.json modified: 2019/2xxx/CVE-2019-2467.json modified: 2019/2xxx/CVE-2019-2468.json modified: 2019/2xxx/CVE-2019-2469.json modified: 2019/2xxx/CVE-2019-2470.json modified: 2019/2xxx/CVE-2019-2471.json modified: 2019/2xxx/CVE-2019-2472.json modified: 2019/2xxx/CVE-2019-2473.json modified: 2019/2xxx/CVE-2019-2474.json modified: 2019/2xxx/CVE-2019-2475.json modified: 2019/2xxx/CVE-2019-2476.json modified: 2019/2xxx/CVE-2019-2477.json modified: 2019/2xxx/CVE-2019-2478.json modified: 2019/2xxx/CVE-2019-2479.json modified: 2019/2xxx/CVE-2019-2480.json modified: 2019/2xxx/CVE-2019-2481.json modified: 2019/2xxx/CVE-2019-2482.json modified: 2019/2xxx/CVE-2019-2485.json modified: 2019/2xxx/CVE-2019-2486.json modified: 2019/2xxx/CVE-2019-2487.json modified: 2019/2xxx/CVE-2019-2488.json modified: 2019/2xxx/CVE-2019-2489.json modified: 2019/2xxx/CVE-2019-2490.json modified: 2019/2xxx/CVE-2019-2491.json modified: 2019/2xxx/CVE-2019-2492.json modified: 2019/2xxx/CVE-2019-2493.json modified: 2019/2xxx/CVE-2019-2494.json modified: 2019/2xxx/CVE-2019-2495.json modified: 2019/2xxx/CVE-2019-2496.json modified: 2019/2xxx/CVE-2019-2497.json modified: 2019/2xxx/CVE-2019-2498.json modified: 2019/2xxx/CVE-2019-2499.json modified: 2019/2xxx/CVE-2019-2500.json modified: 2019/2xxx/CVE-2019-2501.json modified: 2019/2xxx/CVE-2019-2502.json modified: 2019/2xxx/CVE-2019-2503.json modified: 2019/2xxx/CVE-2019-2504.json modified: 2019/2xxx/CVE-2019-2505.json modified: 2019/2xxx/CVE-2019-2506.json modified: 2019/2xxx/CVE-2019-2507.json modified: 2019/2xxx/CVE-2019-2508.json modified: 2019/2xxx/CVE-2019-2509.json modified: 2019/2xxx/CVE-2019-2510.json modified: 2019/2xxx/CVE-2019-2511.json modified: 2019/2xxx/CVE-2019-2512.json modified: 2019/2xxx/CVE-2019-2513.json modified: 2019/2xxx/CVE-2019-2519.json modified: 2019/2xxx/CVE-2019-2520.json modified: 2019/2xxx/CVE-2019-2521.json modified: 2019/2xxx/CVE-2019-2522.json modified: 2019/2xxx/CVE-2019-2523.json modified: 2019/2xxx/CVE-2019-2524.json modified: 2019/2xxx/CVE-2019-2525.json modified: 2019/2xxx/CVE-2019-2526.json modified: 2019/2xxx/CVE-2019-2527.json modified: 2019/2xxx/CVE-2019-2528.json modified: 2019/2xxx/CVE-2019-2529.json modified: 2019/2xxx/CVE-2019-2530.json modified: 2019/2xxx/CVE-2019-2531.json modified: 2019/2xxx/CVE-2019-2532.json modified: 2019/2xxx/CVE-2019-2533.json modified: 2019/2xxx/CVE-2019-2534.json modified: 2019/2xxx/CVE-2019-2535.json modified: 2019/2xxx/CVE-2019-2536.json modified: 2019/2xxx/CVE-2019-2537.json modified: 2019/2xxx/CVE-2019-2538.json modified: 2019/2xxx/CVE-2019-2539.json modified: 2019/2xxx/CVE-2019-2540.json modified: 2019/2xxx/CVE-2019-2541.json modified: 2019/2xxx/CVE-2019-2543.json modified: 2019/2xxx/CVE-2019-2544.json modified: 2019/2xxx/CVE-2019-2545.json modified: 2019/2xxx/CVE-2019-2546.json modified: 2019/2xxx/CVE-2019-2547.json modified: 2019/2xxx/CVE-2019-2548.json modified: 2019/2xxx/CVE-2019-2549.json modified: 2019/2xxx/CVE-2019-2550.json modified: 2019/2xxx/CVE-2019-2552.json modified: 2019/2xxx/CVE-2019-2553.json modified: 2019/2xxx/CVE-2019-2554.json modified: 2019/2xxx/CVE-2019-2555.json modified: 2019/2xxx/CVE-2019-2556.json
2019-01-15 07:39:18 -08:00
}
2019-01-16 14:04:51 -05:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name" : "[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/06/15/10"
},
{
"name" : "[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2014/07/08/1"
},
{
"name" : "[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114",
"refsource" : "MLIST",
"url" : "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1091938",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1091938"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676375",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676375"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676931",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676931"
},
{
"name" : "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt",
"refsource" : "CONFIRM",
"url" : "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt"
},
{
"name" : "https://access.redhat.com/solutions/869353",
"refsource" : "CONFIRM",
"url" : "https://access.redhat.com/solutions/869353"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1116665",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1116665"
},
{
"name" : "https://issues.apache.org/jira/browse/BEANUTILS-463",
"refsource" : "CONFIRM",
"url" : "https://issues.apache.org/jira/browse/BEANUTILS-463"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676303",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676303"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name" : "http://advisories.mageia.org/MGASA-2014-0219.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0219.html"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21675496",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21675496"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21674128",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21674128"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21674812",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21674812"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675266",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675266"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675387",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675387"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675689",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675689"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675898",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675898"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676110",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676110"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27042296",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27042296"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675972",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675972"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677110",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677110"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20140911-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20140911-0001/"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180629-0006/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180629-0006/"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name" : "DSA-2940",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2940"
},
{
"name" : "FEDORA-2014-9380",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html"
},
{
"name" : "GLSA-201607-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201607-09"
},
{
"name" : "HPSBST03160",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=141451023707502&w=2"
},
{
"name" : "HPSBGN03041",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140119284401582&w=2"
},
{
"name" : "HPSBMU03090",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=140801096002766&w=2"
},
{
"name" : "MDVSA-2014:095",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095"
},
{
"name" : "RHSA-2018:2669",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name" : "67121",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/67121"
},
{
"name" : "58851",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58851"
},
{
"name" : "59014",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59014"
},
{
"name" : "59704",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59704"
},
{
"name" : "60177",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60177"
},
{
"name" : "60703",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/60703"
},
{
"name" : "57477",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57477"
},
{
"name" : "59245",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59245"
},
{
"name" : "58947",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58947"
},
{
"name" : "59118",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59118"
},
{
"name" : "59228",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59228"
},
{
"name" : "59246",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59246"
},
{
"name" : "59430",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59430"
},
{
"name" : "59464",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59464"
},
{
"name" : "59479",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59479"
},
{
"name" : "59480",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59480"
},
{
"name" : "58710",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/58710"
},
{
"name" : "59718",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59718"
}
]
}
}