- Synchronized data.

This commit is contained in:
CVE Team 2018-10-10 10:06:30 -04:00
parent 1349a176d9
commit b931a7c46c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 8 additions and 2 deletions

View File

@ -54,6 +54,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00154.html",
"refsource" : "CONFIRM",
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00154.html"
}
]

View File

@ -44,7 +44,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "When BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0."
"value" : "When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0."
}
]
},
@ -63,6 +63,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://support.f5.com/csp/article/K07550539",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K07550539"
}
]

View File

@ -35,7 +35,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter."
"value" : "An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter."
}
]
},
@ -54,6 +54,8 @@
"references" : {
"reference_data" : [
{
"name" : "http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt",
"refsource" : "CONFIRM",
"url" : "http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt"
}
]