2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2002-2185" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2002-12-31T05:00:00.000" ,
"lastModified" : "2018-10-19T15:29:09.193" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"evaluatorSolution" : "IGMP 1 and 2" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:C" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 4.9
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36B60E50-4F5A-4404-BEA3-C94F7D27B156"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "440B7208-34DB-4898-8461-4E703F7EDFB7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5663579C-3AD2-4E5B-A595-C8DB984F9C26"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "29113D8E-9618-4A0E-9157-678332082858"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "313613E9-4837-433C-90EE-84A92E8D24E5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41AA1290-5039-406F-B195-3A4C018202D3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "60CC9410-F6B8-4748-B76F-30626279028E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCC67401-C85A-4E4E-AE61-85FEBBF4346B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C4427AC-07C1-4765-981B-B5D86D698C2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "63EF0CEE-74A9-45C8-8AFD-77815230ACC6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7B59E7C-B059-41CD-AE33-E9623ADA12BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0DF1B657-C910-4BB0-828C-09B6A59D988D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72D61A9F-AC57-4DD9-9047-74BFA9BFACFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C254FC5D-895D-4EFC-B9A7-74699D9FE65E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27532639-37CD-4BD2-AE48-F741009D3449"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EED22734-8AAC-4897-BB71-438E19B8A005"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEA9C28F-18E6-4199-9740-FAB00563EBF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6E63313-9533-478D-ACC0-C050FBA3EACF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*" ,
"matchCriteriaId" : "E040A866-0D2C-40E1-B1FB-DB600B389E27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*" ,
"matchCriteriaId" : "CE1C944A-E5F1-49DE-B069-2A358123B535"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*" ,
"matchCriteriaId" : "D71083B4-1736-4501-8DE8-BC24AC1447AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*" ,
"matchCriteriaId" : "E9D468DB-C4AE-4ACB-B3B7-2FAEA90D6A49"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*" ,
"matchCriteriaId" : "2A32E486-2598-41B3-B6DB-3CC46D239AFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "AAEE18D8-AA3B-47A3-AA7C-AAFF7591F391"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4371A667-18E1-4C54-B2E1-6F885F22F213"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*" ,
"matchCriteriaId" : "5B28763D-8F4B-45E5-82FA-AB7E54C18EBF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "205EF72B-7334-4AE0-9CA6-D2E8E5910C8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*" ,
"matchCriteriaId" : "613A22EC-D93C-48B0-B97C-3E0DDFBD0B62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEB99324-3062-426F-8E2F-44DC3A7ADB2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D3B703C-79B2-4FA2-9E12-713AB977A880"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AA733AD2-D948-46A0-A063-D29081A56F1F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*" ,
"matchCriteriaId" : "BC176BB0-1655-4BEA-A841-C4158167CC9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*" ,
"matchCriteriaId" : "4BF263CB-4239-4DB0-867C-9069ED02CAD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*" ,
"matchCriteriaId" : "81B543F9-C209-46C2-B0AE-E14818A6992E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" ,
"matchCriteriaId" : "EC79FF22-2664-4C40-B0B3-6D23B5F45162"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*" ,
"matchCriteriaId" : "DB89C970-DE94-4E09-A90A-077DB83AD156"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" ,
"matchCriteriaId" : "F9440B25-D206-4914-9557-B5F030890DEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" ,
"matchCriteriaId" : "E9933557-3BCA-4D92-AD4F-27758A0D3347"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" ,
"matchCriteriaId" : "10A60552-15A5-4E95-B3CE-99A4B26260C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D74A418-50F0-42C0-ABBC-BBBE718FF025"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*" ,
"matchCriteriaId" : "344610A8-DB6D-4407-9304-916C419F648C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "B7EC2B95-4715-4EC9-A10A-2542501F8A61"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "64775BEF-2E53-43CA-8639-A7E54F6F4222"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*" ,
"matchCriteriaId" : "FD6576E2-9F26-4857-9F28-F51899F1EF48"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "4DC9842D-E23B-4B9F-A7BF-57C3BA3DE398"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.0:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "C1DE93B9-1ADD-4B19-BA32-7D9F9CCD293F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*" ,
"matchCriteriaId" : "7F3FAAB3-7A8A-42E5-9DCE-E4A843CED1B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "C8783A6D-DFD8-45DD-BF03-570B1B012B44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*" ,
"matchCriteriaId" : "ED36543D-C21B-4B4B-A6AD-6E19B08B5DD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "6A1EF00A-52E9-4FD8-98FD-3998225D8655"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*" ,
"matchCriteriaId" : "9D47D6FE-56A9-42CF-9A9B-AEE272C061F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "9B502A61-44FB-4CD4-85BE-88D4ACCCA441"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" ,
"matchCriteriaId" : "84A50ED3-FD0D-4038-B3E7-CC65D166C968"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*" ,
"matchCriteriaId" : "777F9EC0-2919-45CA-BFF8-78A02537C513"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "8A206E1C-C2EC-4356-8777-B18D7069A4C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*" ,
"matchCriteriaId" : "6E2FE291-1142-4627-A497-C0BB0D934A0B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "49BC7C7E-046C-4186-822E-9F3A2AD3577B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "2FE69F6F-6B17-4C87-ACA4-A2A1FB47206A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*" ,
"matchCriteriaId" : "467A30EB-CB8F-4928-AC8F-F659084A9E2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "714C1439-AB8E-4A8B-A783-D60E9DDC38D4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "62CAE5B0-4D46-4A93-A343-C8E9CB574C62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*" ,
"matchCriteriaId" : "FB647A8B-ADB9-402B-96E1-45321C75731B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "0944FD27-736E-4B55-8D96-9F2CA9BB9B05"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*" ,
"matchCriteriaId" : "373BB5AC-1F38-4D0A-97DC-08E9654403EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5E71DA3-F4A0-46AF-92A2-E691C7A65528"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "1975A2DD-EB22-4ED3-8719-F78AA7F414B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "19F606EE-530F-4C06-82DB-52035EE03FA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*" ,
"matchCriteriaId" : "A0E896D5-0005-4E7E-895D-B202AFCE09A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "5A8B313F-93C7-4558-9571-DE1111487E17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "37F124FE-15F1-49D7-9E03-8E036CE1A20C"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20020901-01-A" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://online.securityfocus.com/archive/1/276968" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/18510" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/18562" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/18684" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.cs.ucsb.edu/~krishna/igmp_dos/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0101.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0140.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0190.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0191.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/427980/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/427981/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/428028/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/428058/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/5020" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/9436" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10736" ,
"source" : "cve@mitre.org"
}
]
}