mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
502 lines
19 KiB
JSON
502 lines
19 KiB
JSON
{
|
|
"id": "CVE-2009-0634",
|
|
"sourceIdentifier": "psirt@cisco.com",
|
|
"published": "2009-03-27T16:30:02.063",
|
|
"lastModified": "2025-04-09T00:30:58.490",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \"home\" (HA) en (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"baseScore": 7.1,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
|
|
"matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
|
|
"matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
|
|
"matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
|
|
"matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
|
|
"matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
|
|
"matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
|
|
"matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
|
|
"matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
|
|
"matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
|
|
"matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
|
|
"matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/34438",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1021898",
|
|
"source": "psirt@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/34241",
|
|
"source": "psirt@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/0851",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424",
|
|
"source": "psirt@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585",
|
|
"source": "psirt@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043",
|
|
"source": "psirt@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/34438",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1021898",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/34241",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/0851",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |