From 9b08ec655f05cb717daf6607353ca74bf930288e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 27 Jan 2020 19:01:19 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/5xxx/CVE-2014-5500.json | 48 ++++++++++++++++++++++- 2014/8xxx/CVE-2014-8563.json | 53 ++++++++++++++++++++++++- 2015/2xxx/CVE-2015-2249.json | 48 ++++++++++++++++++++++- 2018/19xxx/CVE-2018-19441.json | 53 ++++++++++++++++++++++++- 2019/11xxx/CVE-2019-11318.json | 71 +++++++++++++++++++++++++++++++--- 2019/12xxx/CVE-2019-12427.json | 66 ++++++++++++++++++++++++++++--- 2019/15xxx/CVE-2019-15313.json | 67 ++++++++++++++++++++++++++++++++ 2019/19xxx/CVE-2019-19143.json | 56 ++++++++++++++++++++++++--- 2019/19xxx/CVE-2019-19539.json | 56 ++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8945.json | 63 +++++++++++++++++++++++++++++- 2019/8xxx/CVE-2019-8946.json | 63 +++++++++++++++++++++++++++++- 2019/8xxx/CVE-2019-8947.json | 63 +++++++++++++++++++++++++++++- 12 files changed, 669 insertions(+), 38 deletions(-) create mode 100644 2019/15xxx/CVE-2019-15313.json diff --git a/2014/5xxx/CVE-2014-5500.json b/2014/5xxx/CVE-2014-5500.json index 28077c1a330..68ce2584180 100644 --- a/2014/5xxx/CVE-2014-5500.json +++ b/2014/5xxx/CVE-2014-5500.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5500", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Synacor Zimbra Collaboration before 8.0.8 has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" } ] } diff --git a/2014/8xxx/CVE-2014-8563.json b/2014/8xxx/CVE-2014-8563.json index 6d155e7afe1..d94a9940d57 100644 --- a/2014/8xxx/CVE-2014-8563.json +++ b/2014/8xxx/CVE-2014-8563.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8563", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Synacor Zimbra Collaboration before 8.0.9 allows plaintext command injection during STARTTLS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=96105", + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=96105" } ] } diff --git a/2015/2xxx/CVE-2015-2249.json b/2015/2xxx/CVE-2015-2249.json index b56c2845839..5c3f75ef5d3 100644 --- a/2015/2xxx/CVE-2015-2249.json +++ b/2015/2xxx/CVE-2015-2249.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2249", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra Collaboration before 8.6.0 patch5 has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" } ] } diff --git a/2018/19xxx/CVE-2018-19441.json b/2018/19xxx/CVE-2018-19441.json index c7e06b07f99..dc7f2788f2d 100644 --- a/2018/19xxx/CVE-2018-19441.json +++ b/2018/19xxx/CVE-2018-19441.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19441", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Neato Botvac Connected 2.2.0. The GenerateRobotPassword function of the NeatoCrypto library generates insufficiently random numbers for robot secret_key values used for local and cloud authentication/authorization. If an attacker knows the serial number and is able to estimate the time of first provisioning of a robot, he is able to brute force the generated secret_key of the robot. This is because the entropy of the secret_key exclusively relies on these two values, due to not seeding the random generator and using several constant inputs for secret_key computation. Serial numbers are printed on the packaging and equal the MAC address of the robot." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=k5nj7Jhwn9c", + "url": "https://www.youtube.com/watch?v=k5nj7Jhwn9c" + }, + { + "refsource": "MISC", + "name": "https://www.usenix.org/system/files/woot19-paper_ullrich.pdf", + "url": "https://www.usenix.org/system/files/woot19-paper_ullrich.pdf" } ] } diff --git a/2019/11xxx/CVE-2019-11318.json b/2019/11xxx/CVE-2019-11318.json index 20caafb568e..4220158c9d3 100644 --- a/2019/11xxx/CVE-2019-11318.json +++ b/2019/11xxx/CVE-2019-11318.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11318", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11318", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra Collaboration before 8.8.12 Patch 1 has persistent XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://wiki.zimbra.com/wiki/Security_Center", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Security_Center" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109117", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109117" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.12/P1", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.12/P1" } ] } diff --git a/2019/12xxx/CVE-2019-12427.json b/2019/12xxx/CVE-2019-12427.json index ae0e856a559..c897c227e73 100644 --- a/2019/12xxx/CVE-2019-12427.json +++ b/2019/12xxx/CVE-2019-12427.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12427", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12427", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra Collaboration before 8.8.15 Patch 1 is vulnerable to a non-persistent XSS via the Admin Console." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://wiki.zimbra.com/wiki/Security_Center", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Security_Center" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109174", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109174" } ] } diff --git a/2019/15xxx/CVE-2019-15313.json b/2019/15xxx/CVE-2019-15313.json new file mode 100644 index 00000000000..c0a8fce8347 --- /dev/null +++ b/2019/15xxx/CVE-2019-15313.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15313", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Zimbra Collaboration before 8.8.15 Patch 1, there is a non-persistent XSS vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109141", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109141" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19143.json b/2019/19xxx/CVE-2019-19143.json index 94231f70f31..6ae640a2bbe 100644 --- a/2019/19xxx/CVE-2019-19143.json +++ b/2019/19xxx/CVE-2019-19143.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19143", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19143", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://fireshellsecurity.team/hack-n-routers/", + "refsource": "MISC", + "name": "https://fireshellsecurity.team/hack-n-routers/" } ] } diff --git a/2019/19xxx/CVE-2019-19539.json b/2019/19xxx/CVE-2019-19539.json index de3961b94f9..f88ae886677 100644 --- a/2019/19xxx/CVE-2019-19539.json +++ b/2019/19xxx/CVE-2019-19539.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19539", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19539", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Idelji Web ViewPoint H01ABO-H01BY and L01ABP-L01ABZ, Web ViewPoint Plus H01AAG-H01AAQ and L01AAH-L01AAR, and Web ViewPoint Enterprise H01-H01AAE and L01-L01AAF. By reading ADB or AADB file content within the Installation subvolume, a Guardian user can discover the password of the group.user or alias who acknowledges events from the WVP Events screen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03981en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03981en_us" } ] } diff --git a/2019/8xxx/CVE-2019-8945.json b/2019/8xxx/CVE-2019-8945.json index 65f85259783..8b1cdb064f4 100644 --- a/2019/8xxx/CVE-2019-8945.json +++ b/2019/8xxx/CVE-2019-8945.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8945", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,43 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra Collaboration 8.7.x - 8.8.11P2 contains persistent XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109122", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109122" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109123", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109123" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109124", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109124" } ] } diff --git a/2019/8xxx/CVE-2019-8946.json b/2019/8xxx/CVE-2019-8946.json index d12a3131725..e4f1eca34a6 100644 --- a/2019/8xxx/CVE-2019-8946.json +++ b/2019/8xxx/CVE-2019-8946.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8946", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,43 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra Collaboration 8.7.x - 8.8.11P2 contains persistent XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109122", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109122" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109123", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109123" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109124", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109124" } ] } diff --git a/2019/8xxx/CVE-2019-8947.json b/2019/8xxx/CVE-2019-8947.json index d0ab96c0c74..f7e69a7dfb9 100644 --- a/2019/8xxx/CVE-2019-8947.json +++ b/2019/8xxx/CVE-2019-8947.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8947", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,43 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra Collaboration 8.7.x - 8.8.11P2 contains non-persistent XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109122", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109122" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109123", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109123" + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109124", + "refsource": "MISC", + "name": "https://bugzilla.zimbra.com/show_bug.cgi?id=109124" } ] }