2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-0515" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-05-09T10:02:00.000" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T00:06:38.373" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-02 14:06:48 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : true ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC150564-7413-401A-9DD8-8AD773F1D8F9"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49696766-ECCE-4903-AA54-271EFEA58B8D"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:pix_firewall:6.2.2.111:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6A03476-8645-47EE-A139-C866F993B63B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:pix_firewall:6.2.3_\\(110\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "900DC321-4CEF-4810-8247-B82FE93F48BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:pix_firewall:6.3.3_\\(133\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "422F8E64-2376-4E82-A1A2-916BFB7172AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:firewall_services_module:2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9A8528D-DF6A-4493-A77E-CBF08359F2E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F90E9070-781D-4D3D-98EB-5B6DB9D3C75E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:2.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "026A2C0D-AD93-49DC-AF72-8C12AD565B2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "920FAF7C-2964-497B-B1F8-3B060AAB4C55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D499F38-A34C-44D0-A061-C3AE08CF178B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "63E564B5-A39F-4837-93B8-1331CD975D4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1EEDB9DD-C862-4783-9F96-88836424B298"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6b\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BD36C4A-4B90-4012-B4A5-6081C413E302"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C39A993C-5A36-4D3F-B8B6-9B3252713127"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1C4F7D5-DCD0-409C-86BF-A96A5253DF64"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8198D129-76D0-4983-BFC4-8EC724FE1B6A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.2\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BEECFAA-9DD5-4950-B9F1-CF8582225314"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49566EAC-05AF-4880-8000-351AF538E4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23E9FBEE-3213-47FA-8CBA-C285533265FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.4\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "118CBF59-DAD8-468E-B279-F6359E4624F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.4\\(7.202\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "957E6F8F-6881-44DE-A687-9D1E0C13F6CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:4.4\\(8\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E56328FE-F499-4325-AFEC-45BFEAB7662D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AA2E425-904C-4070-8F5F-B81BCF3147F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "604CF950-5D4B-4DC6-819E-0528B22CB05C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.1\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E12887E5-A2BB-4B1E-9621-2961458BCE21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.1\\(4.206\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B5BE2F7-687C-477B-818B-A102526DF36D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "999A0969-60EB-4B2E-A274-9F05D9F840E5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "626E41D2-A5EF-493D-9486-3D9BC3793EAC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EBA31E4D-2215-4E4A-BCCC-B3D922CB752D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(3.210\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4F16AD2C-1CC1-43D9-A944-F67071B62E66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A42FFBF7-9ADB-4F14-BED8-F2E53BEE7B62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(6\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25D16481-CA9A-4B4D-AC9D-3A4F0387FF19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(7\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "56E4588E-6C1F-4720-8082-0EF299435CB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(9\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D24E0E92-59D7-4B16-8B0D-2FD0EE821D93"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED24C763-7558-4AC0-AE10-FDA3D3078D27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4CC85ED3-B598-4A87-A2B8-8D3B52ECC2F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1.200\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C84CE24E-4ED6-43D0-A234-FBD24D22A8A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF84B9FE-7C6C-4578-A5A9-EF0D5EEEEC19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72C3E2B4-3A36-44B5-90D3-1BF9FAD98579"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C558CED8-8342-46CB-9F52-580B626D320E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F85D19E-6C26-429D-B876-F34238B9DAAF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09063867-0E64-4630-B35B-4CCA348E4DAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78F98CD7-A352-483C-9968-8FB2627A7CBD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F97FE485-705F-4707-B6C6-0EF9E8A85D5F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2B925E8-D2C2-4E8C-AC21-0C422245C482"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B9170562-872E-4C32-869C-B10FF35A925E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0927A68-8BB2-4F03-8396-E9CACC158FC0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "559DDBA3-2AF4-4A0C-B219-6779BA931F21"
} ,
2024-07-02 14:06:48 +00:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.1.5\\(104\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F76AED68-8304-4BC6-9D98-64231B08A6A1"
} ,
2023-04-24 12:24:31 +02:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5226C9CC-6933-4F10-B426-B47782C606FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "757DAE9A-B25D-4B8A-A41B-66C2897B537E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E3DC170-E279-4725-B9EE-6840B5685CC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8091EDA9-BD18-47F7-8CEC-E086238647C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F867890-74A4-4892-B99A-27DB4603B873"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE05B514-F094-4632-B25B-973F976F6409"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3392428D-1A85-4472-A276-C482A78E2CE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0D74D2C-662B-4D24-89EE-3DB73F96BBF5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40954985-16E6-4F37-B014-6A55166AE093"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C097809-1FEF-4417-A201-42291CC29122"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E6D5FD3-CF95-4A3B-9ADB-CEC77F73CA78"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045899.html" ,
"source" : "cve@mitre.org"
} ,
2023-08-11 20:00:41 +00:00
{
"url" : "http://secunia.com/advisories/20044" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1016039" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1016040" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.cisco.com/en/US/products/sw/netmgtsw/ps2032/tsd_products_security_response09186a00806824ec.html" ,
"source" : "cve@mitre.org"
} ,
2023-08-11 20:00:41 +00:00
{
"url" : "http://www.osvdb.org/25453" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/433270/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/17883" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vsecurity.com/bulletins/advisories/2006/cisco-websense-bypass.txt" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1738" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26308" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045899.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/20044" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1016039" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1016040" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.cisco.com/en/US/products/sw/netmgtsw/ps2032/tsd_products_security_response09186a00806824ec.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.osvdb.org/25453" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/433270/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/17883" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vsecurity.com/bulletins/advisories/2006/cisco-websense-bypass.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1738" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26308" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}