2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-4047" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2015-05-29T15:59:19.030" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T02:30:21.230" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests."
} ,
{
"lang" : "es" ,
"value" : "racoon/gssapi.c en IPsec-Tools 0.8.2 permite a atacantes remotos causar una denegaci\u00f3n de servicios (referencia a puntero nulo y ca\u00edda de demonio IKE) a trav\u00e9s de una serie de solicitudes UDP manipuladas."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-476"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipsec-tools:ipsec-tools:0.8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4F6D424-26B7-4CD2-80B4-96FBA9E2FA5C"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "56BDB5A0-0839-4A20-A003-B8CD56F48171"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.4.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "55C26031-A354-4E19-A1C3-415336B2E7C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "3B9AF8FC-B730-428D-B317-86ABEF924299"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D75D5AD-C20A-4D94-84E0-E695C9D2A26D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "A53BE5FB-7405-4952-B3BD-6B0B8213F98A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "1A2670B3-1A96-4E72-A316-0AF826E8EC8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA7D64DC-7271-4617-BD46-99C8246779CA"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.3.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "69FBB7A9-69E7-4E84-ABBF-3430FA4FB757"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "5AD67D31-7FB8-4A3F-915D-385617E21428"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C4E5F36-434B-48E1-9715-4EEC22FB23D1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "9970DEE7-9ED1-496F-A5DD-D41A0E13968E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "2620230F-1D8D-423D-953E-9EEF934C56DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "34D75E7F-B65F-421D-92EE-6B20756019C2"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "D1488BC3-CBE9-4944-8573-D7EBE36713B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "17D2F203-B830-42E5-AE54-17453F72A45D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BCF89E7C-806E-4800-BAA9-0225433B6C56"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "79157FB3-C12D-4E05-81A3-776381822B2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "283155E5-EEAB-4E05-A0E7-B9C5077A5029"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7569977A-E567-4115-B00C-4B0CBA86582E"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "E90D8985-EDE3-4613-9B4A-E3929D1D3721"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F2F72B2-84F2-4FA2-9B53-E98344235EB6"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.3.0" ,
"matchCriteriaId" : "C8942D9D-8E3A-4876-8E93-ED8D201FF546"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "3A3BBF17-573E-430A-86CB-A9A2A47940E3"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "BEB08984-6E30-41C0-B283-66D2AAE1E8B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "72ED4B6A-EC5B-400E-88B7-6C986FC5BC4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2C4414E-8016-48B5-8CC3-F97FF2D85922"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.3.0" ,
"versionEndIncluding" : "11.6.4" ,
"matchCriteriaId" : "E859BDBF-D0E7-4621-83F3-4079EEB111BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.1.4" ,
"matchCriteriaId" : "37257612-FAA4-4004-A4D3-4624F06F0615"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42821916-E601-4831-B37B-3202ACF2C562"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.4.1" ,
"matchCriteriaId" : "96B6E81C-8DCA-4560-ABD7-8FB73FBE3824"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.3.0" ,
"matchCriteriaId" : "68BC025A-D45E-45FB-A4E4-1C89320B5BBE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndIncluding" : "11.3.0" ,
"matchCriteriaId" : "7C75978B-566B-4353-8716-099CB8790EE0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9768142-C554-44DE-B8D5-45CB51E3C34C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24AEF0B2-7C8C-432C-A840-C2441A70343F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.0.0" ,
"versionEndIncluding" : "4.5.0" ,
"matchCriteriaId" : "8C8BF865-BA45-4711-829F-EC8E5EA22D2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E21D6206-4716-47FE-A733-F18343656E94"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.2.0" ,
"versionEndIncluding" : "4.5.0" ,
"matchCriteriaId" : "3BC0EAFD-DA5E-4A1B-81CB-0D5A964F9EB6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.0.0" ,
"versionEndIncluding" : "4.5.0" ,
"matchCriteriaId" : "6B3E56EB-202A-4F58-8E94-B2DDA1693498"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndIncluding" : "3.1.1" ,
"matchCriteriaId" : "482E630B-93A1-4B9B-8273-821C116ADC4F"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16F59A04-14CF-49E2-9973-645477EA09DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEECE5FC-CACF-4496-A3E7-164736409252"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://seclists.org/fulldisclosure/2015/May/81" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://seclists.org/fulldisclosure/2015/May/83" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
2024-12-08 03:06:42 +00:00
"Mailing List" ,
2023-04-24 12:24:31 +02:00
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3272" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/05/20/1" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
2024-12-08 03:06:42 +00:00
"Mailing List" ,
2023-04-24 12:24:31 +02:00
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/05/21/11" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/74739" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1032397" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-2623-1" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.f5.com/csp/article/K05013313" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.altsci.com/ipsec/ipsec-tools-sa.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://seclists.org/fulldisclosure/2015/May/81" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://seclists.org/fulldisclosure/2015/May/83" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3272" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/05/20/1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/05/21/11" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/74739" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1032397" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-2623-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.f5.com/csp/article/K05013313" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.altsci.com/ipsec/ipsec-tools-sa.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}