mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
488 lines
18 KiB
JSON
488 lines
18 KiB
JSON
{
|
|
"id": "CVE-2006-4257",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-08-21T20:04:00.000",
|
|
"lastModified": "2024-11-21T00:15:30.563",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "IBM DB2 Universal Database (UDB) before 8.1 FixPak 13 allows remote authenticated users to cause a denial of service (crash) by (1) sending the first ACCSEC command without an RDBNAM parameter during the CONNECT process, or (2) sending crafted SQLJRA packet, which results in a null dereference."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "IBM DB2 Universal Database (UDB) anterior a 8.1 FixPak 13 permite a atacantes autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) (1) enviando el primer comando ACCSEC sin un par\u00e1metro RDBNAM durante el proceso de conexi\u00f3n (CONNECT), o (2) enviando paquetes SQLJRA manipulados, lo cual resulta en una referencia a nulo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"baseScore": 4.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.0:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "CFCC258E-BF48-4D05-805D-25F74A1BD4FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.0:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "C937B416-678E-49BF-90A9-271A00DAF35C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.0:*:os_390:*:*:*:*:*",
|
|
"matchCriteriaId": "3D57D2F4-6A8D-47E6-ADB6-A1D6FFE464C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "0864138D-6D70-4D85-A623-570CF08FC8A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "3E6D6AF7-1083-45B6-8EEF-1C80CC4479FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "0A847132-100A-4109-B890-803D297CB0C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "98CA5DB1-AEB0-4F4E-A5CC-FC9F5929A29C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "7AAB0F57-3E37-4604-842F-372A963CCDF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "E1A207FA-1E31-4E62-B0B5-EF86F4627692"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "C9321C42-CAF0-4079-9389-17B2E3AE34D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "70FDFE4D-769C-4C7A-BCC7-217E05E5AED8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "F0898B3F-D18E-45CF-9D82-CCBC820727EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.4:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "F441845B-9E1F-491C-A5D9-816F6649F00B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "DD4D9995-B739-4C5D-92C7-372B9AB2BD58"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "7FA427F3-DD47-4359-8514-F02C398A8E46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "A220316D-6D0C-47A7-994E-1D8A2CF5D628"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "1C64CAA9-5BE7-4600-AF7E-9CE480861BF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.5:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "E076BD5E-5A25-4EBA-BC8F-FDE8D63FA595"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "0861D4F3-46F1-4A9F-B2A9-4A6756E9706C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "CB16643D-7BD5-41F3-AA61-F6640EDE22CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "29EED40E-A3A2-4F25-8627-2FF60C94BC19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "E75FED7D-2B5C-4C7D-AF3A-956F2FF8C149"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "BE40BCCF-93BB-4B32-8E55-0BD9532E3BF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "5E0C7B84-66C4-4FE5-9412-FBD5DBB4323E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "46320B9E-3FA7-4AF6-80ED-7A89C2678F8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "32041E5A-2DF1-46FA-A520-FFD451AE30BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "43A1F69A-49B6-43E5-A0E2-2572EBBB49C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.6c:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "F05D503A-106D-4192-A1E4-BDB5535ACC4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "38F090EF-53EE-4F21-9B8B-C8C42AD4C121"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "828C5C06-4711-4C57-9657-3CAAAF76DCF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "BF84E6DF-D9E3-4835-BCE1-2B47DB9DC5E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "A7C1ED00-7D98-4F8E-B6A8-C9C16B27196E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "7757DA05-C0A8-49EC-99D4-99AE95CBB2D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "3C334DEF-07A5-4377-85C1-D3623A0904FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "9E1A0923-FCFB-4669-B3C7-7EC65B7CA288"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "34F3CA5A-9FBF-4B35-851D-7A2D6FB0613F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "9CF93B79-4866-448C-A230-4C2F8AAB467B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.7b:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "6EFCAD6F-4741-41B9-AE3E-5F02B8DD90C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "E70C9CA6-890A-4E8D-A625-82538402D336"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "07F0C470-B9D9-4327-A918-FEAEC1BF9436"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "5D454393-D17F-48DB-84DA-05E61D8805F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "61C20E8F-04F8-4609-BC49-C71A2C01739C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "4ADB7290-1954-4873-9B90-772704B2177C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "2D5AB9D5-D732-4C6C-9BCC-6DBA3809780B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "33A46387-BA75-4ECE-AFC0-EF69425E0940"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "7EAD4BCC-88F8-4ED8-A5ED-4E5EFC66CDAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "4540F5C4-B859-4AFD-88ED-029700785D15"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.8a:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "6A224945-8A17-4DBD-BB14-8E8BD476A904"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "8944A5FC-6258-4740-9373-491F8C41DD35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "C99162AE-739B-497B-94B2-7EEA79C5812D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "5D1B08DC-F52B-439B-827D-4BE4ECA78A55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "4313BEDA-BCC5-47E6-934B-58AE8DD21FD0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "D3DE2356-73EB-47D4-BEEF-E9AB8B1FF0FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "4C3AA6C4-7700-4637-8B75-ABED7D8993A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:hp_ux:*:*:*:*:*",
|
|
"matchCriteriaId": "E9A95C89-E9CC-49A2-8395-F3D89774966D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "B730265C-358D-4BBF-8B40-48D943114E3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "719F646C-3958-4469-9C17-430E394E8D70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.1.9a:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "86D936F6-2DC0-4BC3-943E-A5C9F2319206"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.2:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "67C33265-E3BC-406B-9986-E977CDE768FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.10:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "7ED5600A-BD0C-4E48-A8B5-6833883A8981"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.10:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "1CD16421-5F61-46EB-B23C-2267DA0B5FE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.10:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "F680EF69-C60C-482A-A301-E335EBB34217"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.12:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "4CC41143-ADD4-47D0-876A-5C3AB6E94CFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.12:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "00C357A5-DCAF-4F5C-9B83-144D0AB74F02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:db2:8.12:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "47D6DC83-FEBC-4C0B-A774-C55775BB2DF6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21550",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013114",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/445298/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/454307/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/19586",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3328",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21550",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013114",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.appsecinc.com/resources/alerts/db2/2006-09-05.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/445298/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/454307/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/19586",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3328",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |