mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
515 lines
19 KiB
JSON
515 lines
19 KiB
JSON
{
|
|
"id": "CVE-2005-0195",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-05-02T04:00:00.000",
|
|
"lastModified": "2024-11-20T23:54:36.613",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco IOS 12.0S through 12.3YH allows remote attackers to cause a denial of service (device restart) via a crafted IPv6 packet."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C11A2BE-19E7-4148-B3CC-B4956B07273E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6943D9D-4A73-4EB2-B5C5-B7132AFFBE2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E314B0F7-1A27-483E-B3B3-947A5561281F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B29F111-CBA4-464D-8B25-C2677BA270EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42EB3A6A-8B37-47E6-AA9B-1B13FC08F542"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7F75542-F2C5-4CEB-B655-E0620408A3B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "316924D4-10D4-4C98-AF05-DDE1D530A205"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11866346-C29A-463D-A18F-528C23DD579E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01A0A03A-5BFE-4A15-A983-B3EB8EE6B25A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3A63E2B-8C1B-4EF7-BCDD-BBF3EC2C7113"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F05A548B-C443-4C15-B636-64C1F9B9860D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC70491B-F701-4D33-A314-C686469DBD2C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "198C24E9-6D45-44FD-B502-D14ACDA99EDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DEF14D5-1327-4012-913F-DA0E12C4E953"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4DE0B5B8-DEB1-4021-B854-177C0D9FD73A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7A672BD-87AE-424D-8735-073BBE9CE164"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95C033E3-184B-4AC1-B10D-8318FEAF73FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E709D6B-61DB-4905-B539-B8488D7E2DC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "969A5BAA-19D5-4411-BABB-FE55DBA7C7D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54B41182-7AA8-49D1-BAC3-EAF312E43553"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E11BBB83-147B-4FBF-B263-77FCCFB2D92D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3C26842-FF50-436F-8DB6-15A70082CD1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4A31301-AAB0-4744-98B2-695D88798D9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0CEB27CF-46B5-4780-964C-C31193614B74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F1094F9-7222-4DE0-A368-7421ABA66E3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C7EA2BB-A52A-438C-8EB5-CD283CACBACE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "574FFD6F-D56C-41DB-A978-E501BA3CA5D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41E5674D-D1D3-4597-8105-F787465E00A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11790F38-3720-45CF-9FD4-A8E5867684D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AE2282B-6693-4E4B-8662-501EBC14CD9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56365432-1E57-4D35-B764-DDDA878B96ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "390755B3-30B7-4086-8FB2-A41614F747D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A925BA5C-AB2F-4B73-BA93-55664A319CAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40183EF8-BD19-49AD-9E55-7FCCA635327F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8E40D5D-F46E-4098-A46A-1A52A343310D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "550709E5-9302-4FCB-A969-2DA54BCB2184"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D73E5138-016A-48EC-A367-3D3285AAFED2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2E3044F-3CE8-4970-9A7F-FDF555F622A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB57AAA9-4715-468F-A734-A12209A6069F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "480D480A-80A3-4113-A1A6-194A8DD47F65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98FE195E-084B-4F4C-800D-850165DED48C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A310F30-F94D-4A70-94BD-6B94D7B5F5B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "520304A4-EB15-42A8-A402-8251A4D2076D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F80A9B6F-A5D8-403C-9018-0E627FBC9A0E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "139B1182-61A3-4F3D-9E29-758F27917646"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/472582",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA05-026A.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19072",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5813",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/472582",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA05-026A.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19072",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5813",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |