Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-15010 (GCVE-0-2017-15010)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T19:42:22.357Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2017:2913",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://nodesecurity.io/advisories/525"
},
{
"name": "101185",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/101185"
},
{
"name": "RHSA-2018:1264",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"name": "RHSA-2017:2912",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"name": "RHSA-2018:1263",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"name": "FEDORA-2019-76f1b57c1c",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-10-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-06-12T16:06:06",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2017:2913",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://nodesecurity.io/advisories/525"
},
{
"name": "101185",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/101185"
},
{
"name": "RHSA-2018:1264",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"name": "RHSA-2017:2912",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"name": "RHSA-2018:1263",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"name": "FEDORA-2019-76f1b57c1c",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-15010",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2017:2913",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"name": "https://nodesecurity.io/advisories/525",
"refsource": "CONFIRM",
"url": "https://nodesecurity.io/advisories/525"
},
{
"name": "101185",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101185"
},
{
"name": "RHSA-2018:1264",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"name": "RHSA-2017:2912",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"name": "RHSA-2018:1263",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"name": "https://github.com/salesforce/tough-cookie/issues/92",
"refsource": "CONFIRM",
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"name": "https://snyk.io/vuln/npm:tough-cookie:20170905",
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"name": "FEDORA-2019-76f1b57c1c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-15010",
"datePublished": "2017-10-03T16:00:00",
"dateReserved": "2017-10-03T00:00:00",
"dateUpdated": "2024-08-05T19:42:22.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-15010\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-10-04T01:29:03.403\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio con expresiones regulares (ReDoS) en el m\u00f3dulo tough-cookie en versiones anteriores a la 2.3.3 para Node.js. Un atacante que sea capaz de realizar una petici\u00f3n HTTP utilizando una cookie especialmente manipulada podr\u00eda hacer que la aplicaci\u00f3n consuma una cantidad excesiva de recursos de CPU.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:salesforce:tough-cookie:*:*:*:*:*:node.js:*:*\",\"versionEndIncluding\":\"2.3.2\",\"matchCriteriaId\":\"F06572BE-8433-4322-9E3A-4090793D5371\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/101185\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2912\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2913\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1263\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1264\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/salesforce/tough-cookie/issues/92\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://nodesecurity.io/advisories/525\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/npm:tough-cookie:20170905\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2912\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2913\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1263\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/salesforce/tough-cookie/issues/92\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://nodesecurity.io/advisories/525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/npm:tough-cookie:20170905\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
RHSA-2017:2912
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs4-nodejs-tough-cookie is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Tough-Cookie is a Node.js module that offers RFC6265 Cookies and Cookie Jar.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs4-nodejs-tough-cookie (2.3.3). (BZ#1497695)\n\nSecurity Fix(es):\n\n* Regular expression denial of service flaws were found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU. (CVE-2016-1000232, CVE-2017-15010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2912",
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1359818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359818"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2912.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs4-nodejs-tough-cookie security update",
"tracking": {
"current_release_date": "2025-10-10T01:34:03+00:00",
"generator": {
"date": "2025-10-10T01:34:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2017:2912",
"initial_release_date": "2017-10-18T16:46:42+00:00",
"revision_history": [
{
"date": "2017-10-18T16:46:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T16:46:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:34:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000232",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2016-07-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1359818"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse an HTTP header with many semicolons could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000232"
},
{
"category": "external",
"summary": "RHBZ#1359818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000232",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/130",
"url": "https://nodesecurity.io/advisories/130"
}
],
"release_date": "2016-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:46:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons"
},
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:46:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
}
]
}
rhsa-2017:2913
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs6-nodejs-tough-cookie is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Tough-Cookie is a Node.js module that offers RFC6265 Cookies and Cookie Jar.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs6-nodejs-tough-cookie (2.3.3). (BZ#1497701)\n\nSecurity Fix(es):\n\n* A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU. (CVE-2017-15010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2913",
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2913.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs6-nodejs-tough-cookie security update",
"tracking": {
"current_release_date": "2025-10-10T01:34:03+00:00",
"generator": {
"date": "2025-10-10T01:34:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2017:2913",
"initial_release_date": "2017-10-18T16:57:54+00:00",
"revision_history": [
{
"date": "2017-10-18T16:57:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T16:57:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:34:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:57:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
}
]
}
rhsa-2017_2912
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs4-nodejs-tough-cookie is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Tough-Cookie is a Node.js module that offers RFC6265 Cookies and Cookie Jar.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs4-nodejs-tough-cookie (2.3.3). (BZ#1497695)\n\nSecurity Fix(es):\n\n* Regular expression denial of service flaws were found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU. (CVE-2016-1000232, CVE-2017-15010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2912",
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1359818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359818"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2912.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs4-nodejs-tough-cookie security update",
"tracking": {
"current_release_date": "2024-11-14T19:04:51+00:00",
"generator": {
"date": "2024-11-14T19:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2017:2912",
"initial_release_date": "2017-10-18T16:46:42+00:00",
"revision_history": [
{
"date": "2017-10-18T16:46:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T16:46:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T19:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000232",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2016-07-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1359818"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse an HTTP header with many semicolons could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000232"
},
{
"category": "external",
"summary": "RHBZ#1359818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000232",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/130",
"url": "https://nodesecurity.io/advisories/130"
}
],
"release_date": "2016-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:46:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons"
},
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:46:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
}
]
}
rhsa-2017_2913
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs6-nodejs-tough-cookie is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Tough-Cookie is a Node.js module that offers RFC6265 Cookies and Cookie Jar.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs6-nodejs-tough-cookie (2.3.3). (BZ#1497701)\n\nSecurity Fix(es):\n\n* A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU. (CVE-2017-15010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2913",
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2913.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs6-nodejs-tough-cookie security update",
"tracking": {
"current_release_date": "2024-11-13T22:08:40+00:00",
"generator": {
"date": "2024-11-13T22:08:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2017:2913",
"initial_release_date": "2017-10-18T16:57:54+00:00",
"revision_history": [
{
"date": "2017-10-18T16:57:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T16:57:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:08:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:57:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
}
]
}
rhsa-2018_1263
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Mobile Application Platform 4.6.0 release - RPMs",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Mobile Application Platform (RHMAP) 4.6 is delivered as a set of container images.\n\nIn addition to the images, several components are delivered as RPMs:\n\n* OpenShift templates used to deploy an RHMAP Core and MBaaS\n\n* The fh-system-dump-tool allows you to analyze all the projects running in an OpenShift cluster and reports any problems discovered. For more information, see the Operations Guide.\n\nThe following RPMs are included in the RHMAP container images, and are provided here only for completeness:\n\n* The Nagios server, which is used to monitor the status of RHMAP components, is installed inside the Nagios container image.\n\nThis release serves as an update for Red Hat Mobile Application Platform 4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile Application Platform 4.6.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nNagios is a program that monitors hosts and services on your network, and has the ability to send email or page alerts when a problem arises or is resolved.\n\nSecurity Fix(es):\n\n* nodejs-tough-cookie: Regular expression denial of service (CVE-2017-15010)\n \n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1263",
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "RHMAP-19902",
"url": "https://issues.redhat.com/browse/RHMAP-19902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1263.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 release - RPMs",
"tracking": {
"current_release_date": "2024-11-13T22:08:15+00:00",
"generator": {
"date": "2024-11-13T22:08:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2018:1263",
"initial_release_date": "2018-04-30T18:41:22+00:00",
"revision_history": [
{
"date": "2018-04-30T18:41:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-30T18:41:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:08:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Mobile Application Platform 4.6",
"product": {
"name": "Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:mobile_application_platform:4.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Mobile Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product_id": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fh-system-dump-tool@1.0.0-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-devel@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-debuginfo@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-utils@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-oracle@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-cluster@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ifoperstatus@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-swap@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-log@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ifstatus@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-sensors@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dummy@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mrtg@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mysql@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-real@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-game@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-breeze@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-icmp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-http@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-disk@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-snmp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-apt@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-fping@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dns@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-load@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-procs@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-overcr@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ircd@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dhcp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-rpc@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-all@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-wave@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dig@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ide_smart@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ntp-perl@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-pgsql@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-uptime@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ups@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-hpjd@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mrtgtraf@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-disk_smb@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ping@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-perl@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-smtp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-by_ssh@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-time@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-tcp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-users@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ssh@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-debuginfo@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nwstat@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nagios@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ntp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-file_age@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mailq@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dbi@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ldap@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-radius@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-flexlm@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nt@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product": {
"name": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product_id": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs@1.9.7-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product": {
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product_id": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs-debuginfo@1.9.7-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product": {
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product_id": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external-debuginfo@3.3.1-7.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product_id": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external@3.3.1-7.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ssmtp-0:2.64-14.el7map.x86_64",
"product": {
"name": "ssmtp-0:2.64-14.el7map.x86_64",
"product_id": "ssmtp-0:2.64-14.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp@2.64-14.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product": {
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product_id": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp-debuginfo@2.64-14.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product": {
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product_id": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat-debuginfo@2.11-13.20080912svn311.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product_id": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat@2.11-13.20080912svn311.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fping-0:3.10-4.el7map.x86_64",
"product": {
"name": "fping-0:3.10-4.el7map.x86_64",
"product_id": "fping-0:3.10-4.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping@3.10-4.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product": {
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product_id": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping-debuginfo@3.10-4.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product": {
"name": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product_id": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product": {
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product_id": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3-debuginfo@0.6.10-1.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-0:2.8.21-2.el7map.x86_64",
"product": {
"name": "redis-0:2.8.21-2.el7map.x86_64",
"product_id": "redis-0:2.8.21-2.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@2.8.21-2.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product": {
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product_id": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@2.8.21-2.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product": {
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product_id": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES-debuginfo@2.05-20.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product_id": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES@2.05-20.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-common@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-debuginfo@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-devel@4.0.8-8.el7map?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product_id": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fh-system-dump-tool@1.0.0-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product_id": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng@0.5.6-9.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-0:2.0.3-3.el7map.src",
"product": {
"name": "nagios-plugins-0:2.0.3-3.el7map.src",
"product_id": "nagios-plugins-0:2.0.3-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins@2.0.3-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "phantomjs-0:1.9.7-3.el7map.src",
"product": {
"name": "phantomjs-0:1.9.7-3.el7map.src",
"product_id": "phantomjs-0:1.9.7-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs@1.9.7-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product_id": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external@3.3.1-7.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "supervisor-0:3.1.3-3.el7map.src",
"product": {
"name": "supervisor-0:3.1.3-3.el7map.src",
"product_id": "supervisor-0:3.1.3-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/supervisor@3.1.3-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "sendEmail-0:1.56-2.el7.src",
"product": {
"name": "sendEmail-0:1.56-2.el7.src",
"product_id": "sendEmail-0:1.56-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sendEmail@1.56-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ssmtp-0:2.64-14.el7map.src",
"product": {
"name": "ssmtp-0:2.64-14.el7map.src",
"product_id": "ssmtp-0:2.64-14.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp@2.64-14.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product_id": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat@2.11-13.20080912svn311.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "fping-0:3.10-4.el7map.src",
"product": {
"name": "fping-0:3.10-4.el7map.src",
"product_id": "fping-0:3.10-4.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping@3.10-4.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-meld3-0:0.6.10-1.el7map.src",
"product": {
"name": "python-meld3-0:0.6.10-1.el7map.src",
"product_id": "python-meld3-0:0.6.10-1.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product_id": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-SNMP@6.0.1-7.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "redis-0:2.8.21-2.el7map.src",
"product": {
"name": "redis-0:2.8.21-2.el7map.src",
"product_id": "redis-0:2.8.21-2.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@2.8.21-2.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product_id": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-CBC@2.33-2.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product_id": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES@2.05-20.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "nagios-0:4.0.8-8.el7map.src",
"product": {
"name": "nagios-0:4.0.8-8.el7map.src",
"product_id": "nagios-0:4.0.8-8.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios@4.0.8-8.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product_id": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-fh-openshift-templates@4.6.0-5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "supervisor-0:3.1.3-3.el7map.noarch",
"product": {
"name": "supervisor-0:3.1.3-3.el7map.noarch",
"product_id": "supervisor-0:3.1.3-3.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/supervisor@3.1.3-3.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "sendEmail-0:1.56-2.el7.noarch",
"product": {
"name": "sendEmail-0:1.56-2.el7.noarch",
"product_id": "sendEmail-0:1.56-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sendEmail@1.56-2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product_id": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-SNMP@6.0.1-7.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product_id": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-CBC@2.33-2.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product_id": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-fh-openshift-templates@4.6.0-5.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src"
},
"product_reference": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64"
},
"product_reference": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-0:3.10-4.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src"
},
"product_reference": "fping-0:3.10-4.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-0:3.10-4.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64"
},
"product_reference": "fping-0:3.10-4.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64"
},
"product_reference": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-0:4.0.8-8.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src"
},
"product_reference": "nagios-0:4.0.8-8.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-common-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-common-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-0:2.0.3-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src"
},
"product_reference": "nagios-plugins-0:2.0.3-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch"
},
"product_reference": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src"
},
"product_reference": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src"
},
"product_reference": "perl-Crypt-DES-0:2.05-20.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64"
},
"product_reference": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64"
},
"product_reference": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch"
},
"product_reference": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src"
},
"product_reference": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-0:1.9.7-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src"
},
"product_reference": "phantomjs-0:1.9.7-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-0:1.9.7-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64"
},
"product_reference": "phantomjs-0:1.9.7-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64"
},
"product_reference": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-0:0.6.10-1.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src"
},
"product_reference": "python-meld3-0:0.6.10-1.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-0:0.6.10-1.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64"
},
"product_reference": "python-meld3-0:0.6.10-1.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64"
},
"product_reference": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src"
},
"product_reference": "qstat-0:2.11-13.20080912svn311.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64"
},
"product_reference": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64"
},
"product_reference": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src"
},
"product_reference": "radiusclient-ng-0:0.5.6-9.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:2.8.21-2.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src"
},
"product_reference": "redis-0:2.8.21-2.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:2.8.21-2.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64"
},
"product_reference": "redis-0:2.8.21-2.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64"
},
"product_reference": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch"
},
"product_reference": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src"
},
"product_reference": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src"
},
"product_reference": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64"
},
"product_reference": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64"
},
"product_reference": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sendEmail-0:1.56-2.el7.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch"
},
"product_reference": "sendEmail-0:1.56-2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sendEmail-0:1.56-2.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src"
},
"product_reference": "sendEmail-0:1.56-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-0:2.64-14.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src"
},
"product_reference": "ssmtp-0:2.64-14.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-0:2.64-14.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64"
},
"product_reference": "ssmtp-0:2.64-14.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64"
},
"product_reference": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supervisor-0:3.1.3-3.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch"
},
"product_reference": "supervisor-0:3.1.3-3.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supervisor-0:3.1.3-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
},
"product_reference": "supervisor-0:3.1.3-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:41:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
},
{
"cve": "CVE-2018-3728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1545893"
}
],
"notes": [
{
"category": "description",
"text": "hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hoek: Prototype pollution in utilities function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes hoek as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3728"
},
{
"category": "external",
"summary": "RHBZ#1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728"
}
],
"release_date": "2018-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:41:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hoek: Prototype pollution in utilities function"
}
]
}
rhsa-2018_1264
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Mobile Application Platform 4.6.0 Release - Container Images",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Mobile Application Platform (RHMAP) 4.6.0 consists of three main components:\n\n* Core - development and management of apps occurs in the RHMAP Core, which can be installed either in an on-premise installation of OpenShift Container Platform 3.x.\n\n* MBaaS - Application data, runtimes, and integrations are deployed to the RHMAP MBaaS installed on OpenShift Container Platform 3.x.\n\n* Build Farm - deployed separately from the Core and the MBaaS, the Build Farm is shared between all instances of RHMAP. Third-party Linux, Windows, and Apple server hosting providers are used to support building client app binaries for all platforms.\n\nThe Core and MBaaS in RHMAP 4.6 are built on top of OpenShift Container Platform 3.x, Kubernetes, and Red Hat Software Collections. The Core and MBaaS both consist of several components, each running in its own container. Similarly, every cloud app deployed to the MBaaS runs in a container. Those containers are deployed and orchestrated by Kubernetes.\n\nThis release includes the option of provisioning a self-managed Build Farm on your infrastructure, to build Client Apps without relying on hosted Build Farm. For prerequisites and installation instructions, see the Installing RHMAP guide.\n\nFor this RHMAP release, the container images required to run the Core and MBaaS inside OpenShift Container Platform 3.x are:\n\nrhmap46/fh-aaa:1.1.3-4\nrhmap46/fh-appstore:2.1.2-3\nrhmap46/fh-mbaas:6.0.3-2\nrhmap46/fh-messaging:3.2.0-4\nrhmap46/fh-metrics:3.2.0-5\nrhmap46/fh-ngui:5.19.3-1\nrhmap46/fh-scm:1.1.4-2\nrhmap46/fh-statsd:2.1.3-4\nrhmap46/fh-supercore:5.0.10-2\nrhmap46/fh-sdks:1.0.0-36\nrhmap46/gitlab-shell:2.1.2-16\nrhmap46/httpd:2.4-47\nrhmap46/memcached:1.4.15-32\nrhmap46/millicore:7.55.0-4\nrhmap46/mongodb:3.2-36\nrhmap46/mysql:5.5-28\nrhmap46/nagios:4.0.8-58\nrhmap46/redis:2.8.21-40\nrhmap46/ups-eap:1.1.4-35\nrhmap46/wildcard-proxy:1.0.0-17\nrhmap46/installer:1.0.0-42\n\nThis release serves as an update for Red Hat Mobile Application Platform 4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile Application Platform 4.6.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* nodejs-tough-cookie: Regular expression denial of service (CVE-2017-15010)\n \n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1264",
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "RHMAP-19902",
"url": "https://issues.redhat.com/browse/RHMAP-19902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1264.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 Release - Container Images",
"tracking": {
"current_release_date": "2024-11-13T22:08:10+00:00",
"generator": {
"date": "2024-11-13T22:08:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2018:1264",
"initial_release_date": "2018-04-30T18:12:01+00:00",
"revision_history": [
{
"date": "2018-04-30T18:12:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-30T18:12:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:08:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Mobile Application Platform 4.6",
"product": {
"name": "Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:mobile_application_platform:4.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Mobile Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product": {
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product_id": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-aaa\u0026tag=1.1.3-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product": {
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product_id": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-appstore\u0026tag=2.1.2-3"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product": {
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product_id": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-mbaas\u0026tag=6.0.3-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product": {
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product_id": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-messaging\u0026tag=3.2.0-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product": {
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product_id": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-metrics\u0026tag=3.2.0-5"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product": {
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product_id": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-ngui\u0026tag=5.19.3-1"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product": {
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product_id": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-scm\u0026tag=1.1.4-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product": {
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product_id": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-sdks\u0026tag=1.0.0-36"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product": {
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product_id": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-statsd\u0026tag=2.1.3-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product": {
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product_id": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-supercore\u0026tag=5.0.10-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product": {
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product_id": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/gitlab-shell\u0026tag=2.1.2-16"
}
}
},
{
"category": "product_version",
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product": {
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product_id": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product_identification_helper": {
"purl": "pkg:oci/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/httpd\u0026tag=2.4-47"
}
}
},
{
"category": "product_version",
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product": {
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product_id": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/installer\u0026tag=1.0.0-42"
}
}
},
{
"category": "product_version",
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product": {
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product_id": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product_identification_helper": {
"purl": "pkg:oci/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/memcached\u0026tag=1.4.15-32"
}
}
},
{
"category": "product_version",
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product": {
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product_id": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/millicore\u0026tag=7.55.0-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product": {
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product_id": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/mongodb\u0026tag=3.2-36"
}
}
},
{
"category": "product_version",
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product": {
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product_id": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/mysql\u0026tag=5.5-28"
}
}
},
{
"category": "product_version",
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product": {
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product_id": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/nagios\u0026tag=4.0.8-58"
}
}
},
{
"category": "product_version",
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product": {
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product_id": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/redis\u0026tag=2.8.21-40"
}
}
},
{
"category": "product_version",
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product": {
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product_id": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/ups-eap\u0026tag=1.1.4-35"
}
}
},
{
"category": "product_version",
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product": {
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product_id": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/wildcard-proxy\u0026tag=1.0.0-17"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64"
},
"product_reference": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64"
},
"product_reference": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64"
},
"product_reference": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64"
},
"product_reference": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64"
},
"product_reference": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64"
},
"product_reference": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64"
},
"product_reference": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64"
},
"product_reference": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64"
},
"product_reference": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64"
},
"product_reference": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64"
},
"product_reference": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64"
},
"product_reference": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64"
},
"product_reference": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64"
},
"product_reference": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64"
},
"product_reference": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64"
},
"product_reference": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64"
},
"product_reference": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64"
},
"product_reference": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64"
},
"product_reference": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64"
},
"product_reference": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
},
"product_reference": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:12:01+00:00",
"details": "The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the docker pull command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
},
{
"cve": "CVE-2018-3728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1545893"
}
],
"notes": [
{
"category": "description",
"text": "hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hoek: Prototype pollution in utilities function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes hoek as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3728"
},
{
"category": "external",
"summary": "RHBZ#1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728"
}
],
"release_date": "2018-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:12:01+00:00",
"details": "The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the docker pull command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hoek: Prototype pollution in utilities function"
}
]
}
rhsa-2018:1264
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Mobile Application Platform 4.6.0 Release - Container Images",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Mobile Application Platform (RHMAP) 4.6.0 consists of three main components:\n\n* Core - development and management of apps occurs in the RHMAP Core, which can be installed either in an on-premise installation of OpenShift Container Platform 3.x.\n\n* MBaaS - Application data, runtimes, and integrations are deployed to the RHMAP MBaaS installed on OpenShift Container Platform 3.x.\n\n* Build Farm - deployed separately from the Core and the MBaaS, the Build Farm is shared between all instances of RHMAP. Third-party Linux, Windows, and Apple server hosting providers are used to support building client app binaries for all platforms.\n\nThe Core and MBaaS in RHMAP 4.6 are built on top of OpenShift Container Platform 3.x, Kubernetes, and Red Hat Software Collections. The Core and MBaaS both consist of several components, each running in its own container. Similarly, every cloud app deployed to the MBaaS runs in a container. Those containers are deployed and orchestrated by Kubernetes.\n\nThis release includes the option of provisioning a self-managed Build Farm on your infrastructure, to build Client Apps without relying on hosted Build Farm. For prerequisites and installation instructions, see the Installing RHMAP guide.\n\nFor this RHMAP release, the container images required to run the Core and MBaaS inside OpenShift Container Platform 3.x are:\n\nrhmap46/fh-aaa:1.1.3-4\nrhmap46/fh-appstore:2.1.2-3\nrhmap46/fh-mbaas:6.0.3-2\nrhmap46/fh-messaging:3.2.0-4\nrhmap46/fh-metrics:3.2.0-5\nrhmap46/fh-ngui:5.19.3-1\nrhmap46/fh-scm:1.1.4-2\nrhmap46/fh-statsd:2.1.3-4\nrhmap46/fh-supercore:5.0.10-2\nrhmap46/fh-sdks:1.0.0-36\nrhmap46/gitlab-shell:2.1.2-16\nrhmap46/httpd:2.4-47\nrhmap46/memcached:1.4.15-32\nrhmap46/millicore:7.55.0-4\nrhmap46/mongodb:3.2-36\nrhmap46/mysql:5.5-28\nrhmap46/nagios:4.0.8-58\nrhmap46/redis:2.8.21-40\nrhmap46/ups-eap:1.1.4-35\nrhmap46/wildcard-proxy:1.0.0-17\nrhmap46/installer:1.0.0-42\n\nThis release serves as an update for Red Hat Mobile Application Platform 4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile Application Platform 4.6.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* nodejs-tough-cookie: Regular expression denial of service (CVE-2017-15010)\n \n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1264",
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "RHMAP-19902",
"url": "https://issues.redhat.com/browse/RHMAP-19902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1264.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 Release - Container Images",
"tracking": {
"current_release_date": "2025-10-10T04:52:23+00:00",
"generator": {
"date": "2025-10-10T04:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1264",
"initial_release_date": "2018-04-30T18:12:01+00:00",
"revision_history": [
{
"date": "2018-04-30T18:12:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-30T18:12:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T04:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Mobile Application Platform 4.6",
"product": {
"name": "Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:mobile_application_platform:4.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Mobile Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product": {
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product_id": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-aaa\u0026tag=1.1.3-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product": {
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product_id": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-appstore\u0026tag=2.1.2-3"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product": {
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product_id": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-mbaas\u0026tag=6.0.3-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product": {
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product_id": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-messaging\u0026tag=3.2.0-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product": {
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product_id": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-metrics\u0026tag=3.2.0-5"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product": {
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product_id": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-ngui\u0026tag=5.19.3-1"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product": {
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product_id": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-scm\u0026tag=1.1.4-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product": {
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product_id": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-sdks\u0026tag=1.0.0-36"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product": {
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product_id": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-statsd\u0026tag=2.1.3-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product": {
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product_id": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-supercore\u0026tag=5.0.10-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product": {
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product_id": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/gitlab-shell\u0026tag=2.1.2-16"
}
}
},
{
"category": "product_version",
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product": {
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product_id": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product_identification_helper": {
"purl": "pkg:oci/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/httpd\u0026tag=2.4-47"
}
}
},
{
"category": "product_version",
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product": {
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product_id": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/installer\u0026tag=1.0.0-42"
}
}
},
{
"category": "product_version",
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product": {
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product_id": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product_identification_helper": {
"purl": "pkg:oci/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/memcached\u0026tag=1.4.15-32"
}
}
},
{
"category": "product_version",
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product": {
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product_id": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/millicore\u0026tag=7.55.0-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product": {
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product_id": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/mongodb\u0026tag=3.2-36"
}
}
},
{
"category": "product_version",
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product": {
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product_id": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/mysql\u0026tag=5.5-28"
}
}
},
{
"category": "product_version",
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product": {
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product_id": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/nagios\u0026tag=4.0.8-58"
}
}
},
{
"category": "product_version",
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product": {
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product_id": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/redis\u0026tag=2.8.21-40"
}
}
},
{
"category": "product_version",
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product": {
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product_id": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/ups-eap\u0026tag=1.1.4-35"
}
}
},
{
"category": "product_version",
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product": {
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product_id": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/wildcard-proxy\u0026tag=1.0.0-17"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64"
},
"product_reference": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64"
},
"product_reference": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64"
},
"product_reference": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64"
},
"product_reference": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64"
},
"product_reference": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64"
},
"product_reference": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64"
},
"product_reference": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64"
},
"product_reference": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64"
},
"product_reference": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64"
},
"product_reference": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64"
},
"product_reference": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64"
},
"product_reference": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64"
},
"product_reference": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64"
},
"product_reference": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64"
},
"product_reference": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64"
},
"product_reference": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64"
},
"product_reference": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64"
},
"product_reference": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64"
},
"product_reference": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64"
},
"product_reference": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
},
"product_reference": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:12:01+00:00",
"details": "The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the docker pull command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
},
{
"cve": "CVE-2018-3728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1545893"
}
],
"notes": [
{
"category": "description",
"text": "hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hoek: Prototype pollution in utilities function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes hoek as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3728"
},
{
"category": "external",
"summary": "RHBZ#1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728"
}
],
"release_date": "2018-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:12:01+00:00",
"details": "The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the docker pull command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hoek: Prototype pollution in utilities function"
}
]
}
RHSA-2018:1264
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Mobile Application Platform 4.6.0 Release - Container Images",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Mobile Application Platform (RHMAP) 4.6.0 consists of three main components:\n\n* Core - development and management of apps occurs in the RHMAP Core, which can be installed either in an on-premise installation of OpenShift Container Platform 3.x.\n\n* MBaaS - Application data, runtimes, and integrations are deployed to the RHMAP MBaaS installed on OpenShift Container Platform 3.x.\n\n* Build Farm - deployed separately from the Core and the MBaaS, the Build Farm is shared between all instances of RHMAP. Third-party Linux, Windows, and Apple server hosting providers are used to support building client app binaries for all platforms.\n\nThe Core and MBaaS in RHMAP 4.6 are built on top of OpenShift Container Platform 3.x, Kubernetes, and Red Hat Software Collections. The Core and MBaaS both consist of several components, each running in its own container. Similarly, every cloud app deployed to the MBaaS runs in a container. Those containers are deployed and orchestrated by Kubernetes.\n\nThis release includes the option of provisioning a self-managed Build Farm on your infrastructure, to build Client Apps without relying on hosted Build Farm. For prerequisites and installation instructions, see the Installing RHMAP guide.\n\nFor this RHMAP release, the container images required to run the Core and MBaaS inside OpenShift Container Platform 3.x are:\n\nrhmap46/fh-aaa:1.1.3-4\nrhmap46/fh-appstore:2.1.2-3\nrhmap46/fh-mbaas:6.0.3-2\nrhmap46/fh-messaging:3.2.0-4\nrhmap46/fh-metrics:3.2.0-5\nrhmap46/fh-ngui:5.19.3-1\nrhmap46/fh-scm:1.1.4-2\nrhmap46/fh-statsd:2.1.3-4\nrhmap46/fh-supercore:5.0.10-2\nrhmap46/fh-sdks:1.0.0-36\nrhmap46/gitlab-shell:2.1.2-16\nrhmap46/httpd:2.4-47\nrhmap46/memcached:1.4.15-32\nrhmap46/millicore:7.55.0-4\nrhmap46/mongodb:3.2-36\nrhmap46/mysql:5.5-28\nrhmap46/nagios:4.0.8-58\nrhmap46/redis:2.8.21-40\nrhmap46/ups-eap:1.1.4-35\nrhmap46/wildcard-proxy:1.0.0-17\nrhmap46/installer:1.0.0-42\n\nThis release serves as an update for Red Hat Mobile Application Platform 4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile Application Platform 4.6.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* nodejs-tough-cookie: Regular expression denial of service (CVE-2017-15010)\n \n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1264",
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "RHMAP-19902",
"url": "https://issues.redhat.com/browse/RHMAP-19902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1264.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 Release - Container Images",
"tracking": {
"current_release_date": "2025-10-10T04:52:23+00:00",
"generator": {
"date": "2025-10-10T04:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1264",
"initial_release_date": "2018-04-30T18:12:01+00:00",
"revision_history": [
{
"date": "2018-04-30T18:12:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-30T18:12:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T04:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Mobile Application Platform 4.6",
"product": {
"name": "Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:mobile_application_platform:4.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Mobile Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product": {
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product_id": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-aaa\u0026tag=1.1.3-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product": {
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product_id": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-appstore\u0026tag=2.1.2-3"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product": {
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product_id": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-mbaas\u0026tag=6.0.3-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product": {
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product_id": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-messaging\u0026tag=3.2.0-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product": {
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product_id": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-metrics\u0026tag=3.2.0-5"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product": {
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product_id": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-ngui\u0026tag=5.19.3-1"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product": {
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product_id": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-scm\u0026tag=1.1.4-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product": {
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product_id": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-sdks\u0026tag=1.0.0-36"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product": {
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product_id": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-statsd\u0026tag=2.1.3-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product": {
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product_id": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/fh-supercore\u0026tag=5.0.10-2"
}
}
},
{
"category": "product_version",
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product": {
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product_id": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/gitlab-shell\u0026tag=2.1.2-16"
}
}
},
{
"category": "product_version",
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product": {
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product_id": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"product_identification_helper": {
"purl": "pkg:oci/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/httpd\u0026tag=2.4-47"
}
}
},
{
"category": "product_version",
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product": {
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product_id": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/installer\u0026tag=1.0.0-42"
}
}
},
{
"category": "product_version",
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product": {
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product_id": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"product_identification_helper": {
"purl": "pkg:oci/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/memcached\u0026tag=1.4.15-32"
}
}
},
{
"category": "product_version",
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product": {
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product_id": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/millicore\u0026tag=7.55.0-4"
}
}
},
{
"category": "product_version",
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product": {
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product_id": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/mongodb\u0026tag=3.2-36"
}
}
},
{
"category": "product_version",
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product": {
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product_id": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/mysql\u0026tag=5.5-28"
}
}
},
{
"category": "product_version",
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product": {
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product_id": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/nagios\u0026tag=4.0.8-58"
}
}
},
{
"category": "product_version",
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product": {
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product_id": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/redis\u0026tag=2.8.21-40"
}
}
},
{
"category": "product_version",
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product": {
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product_id": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/ups-eap\u0026tag=1.1.4-35"
}
}
},
{
"category": "product_version",
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product": {
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product_id": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8?arch=amd64\u0026repository_url=registry.redhat.io/rhmap46/wildcard-proxy\u0026tag=1.0.0-17"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64"
},
"product_reference": "rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64"
},
"product_reference": "rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64"
},
"product_reference": "rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64"
},
"product_reference": "rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64"
},
"product_reference": "rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64"
},
"product_reference": "rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64"
},
"product_reference": "rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64"
},
"product_reference": "rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64"
},
"product_reference": "rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64"
},
"product_reference": "rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64"
},
"product_reference": "rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64"
},
"product_reference": "rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64"
},
"product_reference": "rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64"
},
"product_reference": "rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64"
},
"product_reference": "rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64"
},
"product_reference": "rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64"
},
"product_reference": "rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64"
},
"product_reference": "rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64"
},
"product_reference": "rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64"
},
"product_reference": "rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
},
"product_reference": "rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:12:01+00:00",
"details": "The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the docker pull command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
},
{
"cve": "CVE-2018-3728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1545893"
}
],
"notes": [
{
"category": "description",
"text": "hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hoek: Prototype pollution in utilities function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes hoek as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3728"
},
{
"category": "external",
"summary": "RHBZ#1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728"
}
],
"release_date": "2018-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:12:01+00:00",
"details": "The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the docker pull command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:rhmap46/fh-aaa@sha256:333fe3a6104328fdf7a163e6782bdc93083f5824a71c172e1a91d8cd2ac4dc45_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-appstore@sha256:ea7077344b9a93df67469b205b84297d9f148f8ede6c5275a934247bb5308cca_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-mbaas@sha256:978137bd62f018ed791f8f242e4f454aa5632260b74416a697af2788f6fa55bc_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-messaging@sha256:969cf2d92202354e4aca3cf2550ab7c06d1c1d9557d9498b111de792b659aba2_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-metrics@sha256:4ae06c04142b0b146ca8a3da6da113d2600fd46307f501043c3a23040d89d2b0_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-ngui@sha256:b5dd33fabd680944f0075f6788ac3b5263a11a542ce51e6705dc0ad94aded656_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-scm@sha256:5ce3e868c6c1a8a86c1bf29ddf0e08e82827d4a39eafd8c5f36229a83f4c880b_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-sdks@sha256:91c35fb5b97a5487aac0db2e45d2aa9c22b8ae2fe96e564c333b89b8c1023683_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-statsd@sha256:55122c42b06eb1202e471247b8f9e1a6af1f855ebd620af74d0c338665bba603_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/fh-supercore@sha256:5400eb2ef4cf354c94c47439e5d3ef4bd355a8951463f0ccb9db40e313cb509e_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/gitlab-shell@sha256:e167f23019582aaca1791ba5f8c26825ea62d9885f6a06362f0a6648137381c7_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/httpd@sha256:338594491055c702411209edb55673d5718285fbf8e6d9241d8963ba929c3754_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/installer@sha256:940137b25079909c06b724d838a48db58a98d49baf3cb9eee0e0a068deba44bb_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/memcached@sha256:65d5a737ae9380a7a041726a33c0b36e4065ec9ea6890d327034f03bb1ce0969_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/millicore@sha256:babc8754be2c766a22461ce88b22fe18d17da84091e0dc4dd9e0edba8199e8f5_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mongodb@sha256:bcfd94b74bfb049fc6c5649216d703f15fe22c2caf30121ade844760fdefc601_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/mysql@sha256:e95585839f27c671609e0bafdb0c3e6752b114882b25b1b35d817142e738a597_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/nagios@sha256:321690d3b24c6281ee7b3bee9b7388676b96b5f3f2a6841bedc872614d73ecd8_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/redis@sha256:752ce940961048a174863aef559c8e303387f67bdbdbe1d91b197c9bbe7f773a_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/ups-eap@sha256:22ef1c2136573a99f278d5f1b384ee35244382a92a3ea2190e74d8ad660f009c_amd64",
"7Server-RH7-RHMAP-4.6:rhmap46/wildcard-proxy@sha256:5abb752987bde3c20273f9b19266bd8ba2015a06336980f8cf02e3a1f969dbf8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hoek: Prototype pollution in utilities function"
}
]
}
rhsa-2017:2912
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs4-nodejs-tough-cookie is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Tough-Cookie is a Node.js module that offers RFC6265 Cookies and Cookie Jar.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs4-nodejs-tough-cookie (2.3.3). (BZ#1497695)\n\nSecurity Fix(es):\n\n* Regular expression denial of service flaws were found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU. (CVE-2016-1000232, CVE-2017-15010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2912",
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1359818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359818"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2912.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs4-nodejs-tough-cookie security update",
"tracking": {
"current_release_date": "2025-10-10T01:34:03+00:00",
"generator": {
"date": "2025-10-10T01:34:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2017:2912",
"initial_release_date": "2017-10-18T16:46:42+00:00",
"revision_history": [
{
"date": "2017-10-18T16:46:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T16:46:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:34:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product_id": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs4-nodejs-tough-cookie@2.3.3-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
},
"product_reference": "rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000232",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2016-07-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1359818"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse an HTTP header with many semicolons could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1000232"
},
{
"category": "external",
"summary": "RHBZ#1359818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1000232",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/130",
"url": "https://nodesecurity.io/advisories/130"
}
],
"release_date": "2016-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:46:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons"
},
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:46:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs4-nodejs-tough-cookie-0:2.3.3-2.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
}
]
}
RHSA-2017:2913
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs6-nodejs-tough-cookie is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Tough-Cookie is a Node.js module that offers RFC6265 Cookies and Cookie Jar.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs6-nodejs-tough-cookie (2.3.3). (BZ#1497701)\n\nSecurity Fix(es):\n\n* A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU. (CVE-2017-15010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2913",
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2913.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs6-nodejs-tough-cookie security update",
"tracking": {
"current_release_date": "2025-10-10T01:34:03+00:00",
"generator": {
"date": "2025-10-10T01:34:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2017:2913",
"initial_release_date": "2017-10-18T16:57:54+00:00",
"revision_history": [
{
"date": "2017-10-18T16:57:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T16:57:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T01:34:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product_id": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-tough-cookie@2.3.3-1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T16:57:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el6.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-tough-cookie-0:2.3.3-1.el7.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
}
]
}
RHSA-2018:1263
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Mobile Application Platform 4.6.0 release - RPMs",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Mobile Application Platform (RHMAP) 4.6 is delivered as a set of container images.\n\nIn addition to the images, several components are delivered as RPMs:\n\n* OpenShift templates used to deploy an RHMAP Core and MBaaS\n\n* The fh-system-dump-tool allows you to analyze all the projects running in an OpenShift cluster and reports any problems discovered. For more information, see the Operations Guide.\n\nThe following RPMs are included in the RHMAP container images, and are provided here only for completeness:\n\n* The Nagios server, which is used to monitor the status of RHMAP components, is installed inside the Nagios container image.\n\nThis release serves as an update for Red Hat Mobile Application Platform 4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile Application Platform 4.6.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nNagios is a program that monitors hosts and services on your network, and has the ability to send email or page alerts when a problem arises or is resolved.\n\nSecurity Fix(es):\n\n* nodejs-tough-cookie: Regular expression denial of service (CVE-2017-15010)\n \n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1263",
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "RHMAP-19902",
"url": "https://issues.redhat.com/browse/RHMAP-19902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1263.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 release - RPMs",
"tracking": {
"current_release_date": "2025-10-10T04:52:23+00:00",
"generator": {
"date": "2025-10-10T04:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1263",
"initial_release_date": "2018-04-30T18:41:22+00:00",
"revision_history": [
{
"date": "2018-04-30T18:41:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-30T18:41:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T04:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Mobile Application Platform 4.6",
"product": {
"name": "Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:mobile_application_platform:4.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Mobile Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product_id": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fh-system-dump-tool@1.0.0-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-devel@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-debuginfo@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-utils@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-oracle@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-cluster@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ifoperstatus@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-swap@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-log@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ifstatus@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-sensors@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dummy@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mrtg@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mysql@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-real@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-game@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-breeze@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-icmp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-http@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-disk@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-snmp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-apt@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-fping@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dns@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-load@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-procs@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-overcr@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ircd@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dhcp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-rpc@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-all@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-wave@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dig@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ide_smart@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ntp-perl@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-pgsql@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-uptime@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ups@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-hpjd@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mrtgtraf@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-disk_smb@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ping@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-perl@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-smtp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-by_ssh@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-time@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-tcp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-users@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ssh@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-debuginfo@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nwstat@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nagios@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ntp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-file_age@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mailq@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dbi@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ldap@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-radius@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-flexlm@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nt@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product": {
"name": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product_id": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs@1.9.7-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product": {
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product_id": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs-debuginfo@1.9.7-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product": {
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product_id": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external-debuginfo@3.3.1-7.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product_id": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external@3.3.1-7.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ssmtp-0:2.64-14.el7map.x86_64",
"product": {
"name": "ssmtp-0:2.64-14.el7map.x86_64",
"product_id": "ssmtp-0:2.64-14.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp@2.64-14.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product": {
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product_id": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp-debuginfo@2.64-14.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product": {
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product_id": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat-debuginfo@2.11-13.20080912svn311.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product_id": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat@2.11-13.20080912svn311.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fping-0:3.10-4.el7map.x86_64",
"product": {
"name": "fping-0:3.10-4.el7map.x86_64",
"product_id": "fping-0:3.10-4.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping@3.10-4.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product": {
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product_id": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping-debuginfo@3.10-4.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product": {
"name": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product_id": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product": {
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product_id": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3-debuginfo@0.6.10-1.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-0:2.8.21-2.el7map.x86_64",
"product": {
"name": "redis-0:2.8.21-2.el7map.x86_64",
"product_id": "redis-0:2.8.21-2.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@2.8.21-2.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product": {
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product_id": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@2.8.21-2.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product": {
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product_id": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES-debuginfo@2.05-20.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product_id": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES@2.05-20.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-common@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-debuginfo@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-devel@4.0.8-8.el7map?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product_id": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fh-system-dump-tool@1.0.0-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product_id": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng@0.5.6-9.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-0:2.0.3-3.el7map.src",
"product": {
"name": "nagios-plugins-0:2.0.3-3.el7map.src",
"product_id": "nagios-plugins-0:2.0.3-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins@2.0.3-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "phantomjs-0:1.9.7-3.el7map.src",
"product": {
"name": "phantomjs-0:1.9.7-3.el7map.src",
"product_id": "phantomjs-0:1.9.7-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs@1.9.7-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product_id": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external@3.3.1-7.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "supervisor-0:3.1.3-3.el7map.src",
"product": {
"name": "supervisor-0:3.1.3-3.el7map.src",
"product_id": "supervisor-0:3.1.3-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/supervisor@3.1.3-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "sendEmail-0:1.56-2.el7.src",
"product": {
"name": "sendEmail-0:1.56-2.el7.src",
"product_id": "sendEmail-0:1.56-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sendEmail@1.56-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ssmtp-0:2.64-14.el7map.src",
"product": {
"name": "ssmtp-0:2.64-14.el7map.src",
"product_id": "ssmtp-0:2.64-14.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp@2.64-14.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product_id": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat@2.11-13.20080912svn311.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "fping-0:3.10-4.el7map.src",
"product": {
"name": "fping-0:3.10-4.el7map.src",
"product_id": "fping-0:3.10-4.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping@3.10-4.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-meld3-0:0.6.10-1.el7map.src",
"product": {
"name": "python-meld3-0:0.6.10-1.el7map.src",
"product_id": "python-meld3-0:0.6.10-1.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product_id": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-SNMP@6.0.1-7.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "redis-0:2.8.21-2.el7map.src",
"product": {
"name": "redis-0:2.8.21-2.el7map.src",
"product_id": "redis-0:2.8.21-2.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@2.8.21-2.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product_id": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-CBC@2.33-2.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product_id": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES@2.05-20.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "nagios-0:4.0.8-8.el7map.src",
"product": {
"name": "nagios-0:4.0.8-8.el7map.src",
"product_id": "nagios-0:4.0.8-8.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios@4.0.8-8.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product_id": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-fh-openshift-templates@4.6.0-5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "supervisor-0:3.1.3-3.el7map.noarch",
"product": {
"name": "supervisor-0:3.1.3-3.el7map.noarch",
"product_id": "supervisor-0:3.1.3-3.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/supervisor@3.1.3-3.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "sendEmail-0:1.56-2.el7.noarch",
"product": {
"name": "sendEmail-0:1.56-2.el7.noarch",
"product_id": "sendEmail-0:1.56-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sendEmail@1.56-2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product_id": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-SNMP@6.0.1-7.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product_id": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-CBC@2.33-2.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product_id": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-fh-openshift-templates@4.6.0-5.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src"
},
"product_reference": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64"
},
"product_reference": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-0:3.10-4.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src"
},
"product_reference": "fping-0:3.10-4.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-0:3.10-4.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64"
},
"product_reference": "fping-0:3.10-4.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64"
},
"product_reference": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-0:4.0.8-8.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src"
},
"product_reference": "nagios-0:4.0.8-8.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-common-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-common-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-0:2.0.3-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src"
},
"product_reference": "nagios-plugins-0:2.0.3-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch"
},
"product_reference": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src"
},
"product_reference": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src"
},
"product_reference": "perl-Crypt-DES-0:2.05-20.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64"
},
"product_reference": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64"
},
"product_reference": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch"
},
"product_reference": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src"
},
"product_reference": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-0:1.9.7-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src"
},
"product_reference": "phantomjs-0:1.9.7-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-0:1.9.7-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64"
},
"product_reference": "phantomjs-0:1.9.7-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64"
},
"product_reference": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-0:0.6.10-1.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src"
},
"product_reference": "python-meld3-0:0.6.10-1.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-0:0.6.10-1.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64"
},
"product_reference": "python-meld3-0:0.6.10-1.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64"
},
"product_reference": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src"
},
"product_reference": "qstat-0:2.11-13.20080912svn311.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64"
},
"product_reference": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64"
},
"product_reference": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src"
},
"product_reference": "radiusclient-ng-0:0.5.6-9.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:2.8.21-2.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src"
},
"product_reference": "redis-0:2.8.21-2.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:2.8.21-2.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64"
},
"product_reference": "redis-0:2.8.21-2.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64"
},
"product_reference": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch"
},
"product_reference": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src"
},
"product_reference": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src"
},
"product_reference": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64"
},
"product_reference": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64"
},
"product_reference": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sendEmail-0:1.56-2.el7.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch"
},
"product_reference": "sendEmail-0:1.56-2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sendEmail-0:1.56-2.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src"
},
"product_reference": "sendEmail-0:1.56-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-0:2.64-14.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src"
},
"product_reference": "ssmtp-0:2.64-14.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-0:2.64-14.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64"
},
"product_reference": "ssmtp-0:2.64-14.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64"
},
"product_reference": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supervisor-0:3.1.3-3.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch"
},
"product_reference": "supervisor-0:3.1.3-3.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supervisor-0:3.1.3-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
},
"product_reference": "supervisor-0:3.1.3-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:41:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
},
{
"cve": "CVE-2018-3728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1545893"
}
],
"notes": [
{
"category": "description",
"text": "hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hoek: Prototype pollution in utilities function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes hoek as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3728"
},
{
"category": "external",
"summary": "RHBZ#1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728"
}
],
"release_date": "2018-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:41:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hoek: Prototype pollution in utilities function"
}
]
}
rhsa-2018:1263
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Mobile Application Platform 4.6.0 release - RPMs",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Mobile Application Platform (RHMAP) 4.6 is delivered as a set of container images.\n\nIn addition to the images, several components are delivered as RPMs:\n\n* OpenShift templates used to deploy an RHMAP Core and MBaaS\n\n* The fh-system-dump-tool allows you to analyze all the projects running in an OpenShift cluster and reports any problems discovered. For more information, see the Operations Guide.\n\nThe following RPMs are included in the RHMAP container images, and are provided here only for completeness:\n\n* The Nagios server, which is used to monitor the status of RHMAP components, is installed inside the Nagios container image.\n\nThis release serves as an update for Red Hat Mobile Application Platform 4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile Application Platform 4.6.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nNagios is a program that monitors hosts and services on your network, and has the ability to send email or page alerts when a problem arises or is resolved.\n\nSecurity Fix(es):\n\n* nodejs-tough-cookie: Regular expression denial of service (CVE-2017-15010)\n \n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1263",
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "RHMAP-19902",
"url": "https://issues.redhat.com/browse/RHMAP-19902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1263.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 release - RPMs",
"tracking": {
"current_release_date": "2025-10-10T04:52:23+00:00",
"generator": {
"date": "2025-10-10T04:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1263",
"initial_release_date": "2018-04-30T18:41:22+00:00",
"revision_history": [
{
"date": "2018-04-30T18:41:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-30T18:41:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T04:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Mobile Application Platform 4.6",
"product": {
"name": "Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:mobile_application_platform:4.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Mobile Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product_id": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fh-system-dump-tool@1.0.0-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-devel@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-debuginfo@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product": {
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product_id": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng-utils@0.5.6-9.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-oracle@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-cluster@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ifoperstatus@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-swap@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-log@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ifstatus@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-sensors@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dummy@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mrtg@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mysql@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-real@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-game@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-breeze@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-icmp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-http@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-disk@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-snmp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-apt@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-fping@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dns@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-load@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-procs@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-overcr@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ircd@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dhcp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-rpc@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-all@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-wave@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dig@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ide_smart@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ntp-perl@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-pgsql@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-uptime@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ups@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-hpjd@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mrtgtraf@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-disk_smb@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ping@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-perl@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-smtp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-by_ssh@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-time@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-tcp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-users@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ssh@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-debuginfo@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nwstat@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nagios@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ntp@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-file_age@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-mailq@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-dbi@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-ldap@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-radius@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-flexlm@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product": {
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product_id": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins-nt@2.0.3-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product": {
"name": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product_id": "phantomjs-0:1.9.7-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs@1.9.7-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product": {
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product_id": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs-debuginfo@1.9.7-3.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product": {
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product_id": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external-debuginfo@3.3.1-7.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product_id": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external@3.3.1-7.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ssmtp-0:2.64-14.el7map.x86_64",
"product": {
"name": "ssmtp-0:2.64-14.el7map.x86_64",
"product_id": "ssmtp-0:2.64-14.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp@2.64-14.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product": {
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product_id": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp-debuginfo@2.64-14.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product": {
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product_id": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat-debuginfo@2.11-13.20080912svn311.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product_id": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat@2.11-13.20080912svn311.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fping-0:3.10-4.el7map.x86_64",
"product": {
"name": "fping-0:3.10-4.el7map.x86_64",
"product_id": "fping-0:3.10-4.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping@3.10-4.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product": {
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product_id": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping-debuginfo@3.10-4.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product": {
"name": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product_id": "python-meld3-0:0.6.10-1.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product": {
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product_id": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3-debuginfo@0.6.10-1.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-0:2.8.21-2.el7map.x86_64",
"product": {
"name": "redis-0:2.8.21-2.el7map.x86_64",
"product_id": "redis-0:2.8.21-2.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@2.8.21-2.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product": {
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product_id": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@2.8.21-2.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product": {
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product_id": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES-debuginfo@2.05-20.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product_id": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES@2.05-20.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-common-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-common@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-debuginfo@4.0.8-8.el7map?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product": {
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product_id": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-devel@4.0.8-8.el7map?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product_id": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fh-system-dump-tool@1.0.0-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product_id": "radiusclient-ng-0:0.5.6-9.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/radiusclient-ng@0.5.6-9.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "nagios-plugins-0:2.0.3-3.el7map.src",
"product": {
"name": "nagios-plugins-0:2.0.3-3.el7map.src",
"product_id": "nagios-plugins-0:2.0.3-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios-plugins@2.0.3-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "phantomjs-0:1.9.7-3.el7map.src",
"product": {
"name": "phantomjs-0:1.9.7-3.el7map.src",
"product_id": "phantomjs-0:1.9.7-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/phantomjs@1.9.7-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product_id": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-mod_authnz_external@3.3.1-7.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "supervisor-0:3.1.3-3.el7map.src",
"product": {
"name": "supervisor-0:3.1.3-3.el7map.src",
"product_id": "supervisor-0:3.1.3-3.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/supervisor@3.1.3-3.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "sendEmail-0:1.56-2.el7.src",
"product": {
"name": "sendEmail-0:1.56-2.el7.src",
"product_id": "sendEmail-0:1.56-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sendEmail@1.56-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ssmtp-0:2.64-14.el7map.src",
"product": {
"name": "ssmtp-0:2.64-14.el7map.src",
"product_id": "ssmtp-0:2.64-14.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ssmtp@2.64-14.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product_id": "qstat-0:2.11-13.20080912svn311.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qstat@2.11-13.20080912svn311.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "fping-0:3.10-4.el7map.src",
"product": {
"name": "fping-0:3.10-4.el7map.src",
"product_id": "fping-0:3.10-4.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fping@3.10-4.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-meld3-0:0.6.10-1.el7map.src",
"product": {
"name": "python-meld3-0:0.6.10-1.el7map.src",
"product_id": "python-meld3-0:0.6.10-1.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product_id": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-SNMP@6.0.1-7.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "redis-0:2.8.21-2.el7map.src",
"product": {
"name": "redis-0:2.8.21-2.el7map.src",
"product_id": "redis-0:2.8.21-2.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@2.8.21-2.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product_id": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-CBC@2.33-2.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product_id": "perl-Crypt-DES-0:2.05-20.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-DES@2.05-20.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "nagios-0:4.0.8-8.el7map.src",
"product": {
"name": "nagios-0:4.0.8-8.el7map.src",
"product_id": "nagios-0:4.0.8-8.el7map.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nagios@4.0.8-8.el7map?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product_id": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-fh-openshift-templates@4.6.0-5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "supervisor-0:3.1.3-3.el7map.noarch",
"product": {
"name": "supervisor-0:3.1.3-3.el7map.noarch",
"product_id": "supervisor-0:3.1.3-3.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/supervisor@3.1.3-3.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "sendEmail-0:1.56-2.el7.noarch",
"product": {
"name": "sendEmail-0:1.56-2.el7.noarch",
"product_id": "sendEmail-0:1.56-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sendEmail@1.56-2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product_id": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-SNMP@6.0.1-7.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product_id": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Crypt-CBC@2.33-2.el7map?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product_id": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhmap-fh-openshift-templates@4.6.0-5.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src"
},
"product_reference": "fh-system-dump-tool-0:1.0.0-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64"
},
"product_reference": "fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-0:3.10-4.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src"
},
"product_reference": "fping-0:3.10-4.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-0:3.10-4.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64"
},
"product_reference": "fping-0:3.10-4.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fping-debuginfo-0:3.10-4.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64"
},
"product_reference": "fping-debuginfo-0:3.10-4.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-0:4.0.8-8.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src"
},
"product_reference": "nagios-0:4.0.8-8.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-common-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-common-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-devel-0:4.0.8-8.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64"
},
"product_reference": "nagios-devel-0:4.0.8-8.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-0:2.0.3-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src"
},
"product_reference": "nagios-plugins-0:2.0.3-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64"
},
"product_reference": "nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch"
},
"product_reference": "perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-CBC-0:2.33-2.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src"
},
"product_reference": "perl-Crypt-CBC-0:2.33-2.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src"
},
"product_reference": "perl-Crypt-DES-0:2.05-20.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-0:2.05-20.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64"
},
"product_reference": "perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64"
},
"product_reference": "perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch"
},
"product_reference": "perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-SNMP-0:6.0.1-7.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src"
},
"product_reference": "perl-Net-SNMP-0:6.0.1-7.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-0:1.9.7-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src"
},
"product_reference": "phantomjs-0:1.9.7-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-0:1.9.7-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64"
},
"product_reference": "phantomjs-0:1.9.7-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64"
},
"product_reference": "phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-0:0.6.10-1.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src"
},
"product_reference": "python-meld3-0:0.6.10-1.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-0:0.6.10-1.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64"
},
"product_reference": "python-meld3-0:0.6.10-1.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64"
},
"product_reference": "python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src"
},
"product_reference": "qstat-0:2.11-13.20080912svn311.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-0:2.11-13.20080912svn311.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64"
},
"product_reference": "qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64"
},
"product_reference": "qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src"
},
"product_reference": "radiusclient-ng-0:0.5.6-9.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64"
},
"product_reference": "radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:2.8.21-2.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src"
},
"product_reference": "redis-0:2.8.21-2.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:2.8.21-2.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64"
},
"product_reference": "redis-0:2.8.21-2.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:2.8.21-2.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64"
},
"product_reference": "redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch"
},
"product_reference": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src"
},
"product_reference": "rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src"
},
"product_reference": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64"
},
"product_reference": "rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64"
},
"product_reference": "rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sendEmail-0:1.56-2.el7.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch"
},
"product_reference": "sendEmail-0:1.56-2.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sendEmail-0:1.56-2.el7.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src"
},
"product_reference": "sendEmail-0:1.56-2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-0:2.64-14.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src"
},
"product_reference": "ssmtp-0:2.64-14.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-0:2.64-14.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64"
},
"product_reference": "ssmtp-0:2.64-14.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64 as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64"
},
"product_reference": "ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supervisor-0:3.1.3-3.el7map.noarch as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch"
},
"product_reference": "supervisor-0:3.1.3-3.el7map.noarch",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supervisor-0:3.1.3-3.el7map.src as a component of Red Hat Mobile Application Platform 4.6",
"product_id": "7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
},
"product_reference": "supervisor-0:3.1.3-3.el7map.src",
"relates_to_product_reference": "7Server-RH7-RHMAP-4.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-15010",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1493989"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-tough-cookie: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include nodejs-tough-cookie as a build time dependency of protractor. It\u0027s no included in the runtime code, and is therefore not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15010"
},
{
"category": "external",
"summary": "RHBZ#1493989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/525",
"url": "https://nodesecurity.io/advisories/525"
}
],
"release_date": "2017-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:41:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-tough-cookie: Regular expression denial of service"
},
{
"cve": "CVE-2018-3728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1545893"
}
],
"notes": [
{
"category": "description",
"text": "hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hoek: Prototype pollution in utilities function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes hoek as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3728"
},
{
"category": "external",
"summary": "RHBZ#1545893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728"
}
],
"release_date": "2018-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-30T18:41:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:fh-system-dump-tool-0:1.0.0-5.el7.x86_64",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.src",
"7Server-RH7-RHMAP-4.6:fping-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:fping-debuginfo-0:3.10-4.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-common-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-debuginfo-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-devel-0:4.0.8-8.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.src",
"7Server-RH7-RHMAP-4.6:nagios-plugins-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-all-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-apt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-breeze-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-by_ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-cluster-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dbi-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-debuginfo-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dhcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dig-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-disk_smb-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dns-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-dummy-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-file_age-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-flexlm-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-fping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-game-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-hpjd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-http-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-icmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ide_smart-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifoperstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ifstatus-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ircd-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ldap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-load-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-log-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mailq-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtg-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mrtgtraf-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-mysql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nagios-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nt-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ntp-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-nwstat-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-oracle-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-overcr-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-perl-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-pgsql-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ping-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-procs-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-radius-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-real-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-rpc-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-sensors-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-smtp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-snmp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ssh-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-swap-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-tcp-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-time-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-ups-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-uptime-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-users-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:nagios-plugins-wave-0:2.0.3-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Crypt-CBC-0:2.33-2.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.src",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Crypt-DES-debuginfo-0:2.05-20.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.noarch",
"7Server-RH7-RHMAP-4.6:perl-Net-SNMP-0:6.0.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.src",
"7Server-RH7-RHMAP-4.6:phantomjs-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:phantomjs-debuginfo-0:1.9.7-3.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.src",
"7Server-RH7-RHMAP-4.6:python-meld3-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:python-meld3-debuginfo-0:0.6.10-1.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.src",
"7Server-RH7-RHMAP-4.6:qstat-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:qstat-debuginfo-0:2.11-13.20080912svn311.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.src",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-debuginfo-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-devel-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:radiusclient-ng-utils-0:0.5.6-9.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.src",
"7Server-RH7-RHMAP-4.6:redis-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:redis-debuginfo-0:2.8.21-2.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.noarch",
"7Server-RH7-RHMAP-4.6:rhmap-fh-openshift-templates-0:4.6.0-5.el7.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.src",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:rhmap-mod_authnz_external-debuginfo-0:3.3.1-7.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.noarch",
"7Server-RH7-RHMAP-4.6:sendEmail-0:1.56-2.el7.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.src",
"7Server-RH7-RHMAP-4.6:ssmtp-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:ssmtp-debuginfo-0:2.64-14.el7map.x86_64",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.noarch",
"7Server-RH7-RHMAP-4.6:supervisor-0:3.1.3-3.el7map.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hoek: Prototype pollution in utilities function"
}
]
}
CERTFR-2024-AVI-0575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.4 antérieures à 22.4R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 23.2 antérieures à 23.2R2-S1 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.2 antérieures à SSR-6.2.5-r2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.4-EVO antérieures à 22.4R3-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.2-EVO antérieures à 23.2R2-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.2 antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.3-EVO antérieures à 21.3R3-S5-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.2-EVO antérieures à 21.2R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 20.4R3-S9 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R2-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.1 antérieures à SSR-6.1.8-lts | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 antérieures à 20.4R3-S10 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 antérieures à 22.2R3-S1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 21.4 antérieures à 21.4R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R1-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 antérieures à 22.2R3-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 23.2R1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R1-S1-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.4R3-S8 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R1-S1 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions antérieures à 21.2R3-S7 | ||
| Juniper Networks | N/A | Session Smart Router versions antérieures à SSR-5.6.14 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 antérieures à 22.1R3-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 antérieures à 22.3R3-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.4R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R1-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R1-S1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos Space versions antérieures à 24.1R1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 20.4R3-S10-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.4 antérieures à 22.4R3-S1 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R1-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R2-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à before 22.1R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R2-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 antérieures à 22.1R3-S4 | ||
| Juniper Networks | N/A | Junos OS versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 22.1R2-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R1-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R2-S1 | ||
| Juniper Networks | N/A | Junos OS versions 23.1 antérieures à 23.1R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R2-S2 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R1-S2-EVO |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 6.2 ant\u00e9rieures \u00e0 SSR-6.2.5-r2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.3-EVO ant\u00e9rieures \u00e0 21.3R3-S5-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R3-S7-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R2-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 6.1 ant\u00e9rieures \u00e0 SSR-6.1.8-lts",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S10",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 23.2R1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R1-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions ant\u00e9rieures \u00e0 21.2R3-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-5.6.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R1-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S10-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R2-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 before 22.1R3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 22.1R2-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R2-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.1 ant\u00e9rieures \u00e0 23.1R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R2-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-39560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39560"
},
{
"name": "CVE-2023-32435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2024-39554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39554"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-39539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39539"
},
{
"name": "CVE-2021-36160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2024-39558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39558"
},
{
"name": "CVE-2022-30522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30522"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-39552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39552"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2021-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29469"
},
{
"name": "CVE-2023-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2020-13950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2024-39546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39546"
},
{
"name": "CVE-2024-39540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39540"
},
{
"name": "CVE-2018-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3737"
},
{
"name": "CVE-2024-39543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39543"
},
{
"name": "CVE-2020-11984",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11984"
},
{
"name": "CVE-2022-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22721"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-39514",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39514"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-42013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42013"
},
{
"name": "CVE-2023-34059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
},
{
"name": "CVE-2024-39529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39529"
},
{
"name": "CVE-2006-20001",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2022-29167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29167"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2019-10747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10747"
},
{
"name": "CVE-2023-34058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
},
{
"name": "CVE-2011-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2019-10097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10097"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2024-39536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39536"
},
{
"name": "CVE-2024-39555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39555"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2020-13938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13938"
},
{
"name": "CVE-2016-10540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
},
{
"name": "CVE-2019-10082",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10082"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2016-1000232",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2024-39561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39561"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2020-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-41741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41741"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-39535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39535"
},
{
"name": "CVE-2024-39545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39545"
},
{
"name": "CVE-2024-39531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39531"
},
{
"name": "CVE-2022-41742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2019-10081",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10081"
},
{
"name": "CVE-2020-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1934"
},
{
"name": "CVE-2022-30556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30556"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2023-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
},
{
"name": "CVE-2024-39530",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39530"
},
{
"name": "CVE-2024-39532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39532"
},
{
"name": "CVE-2023-27522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
},
{
"name": "CVE-2024-39557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39557"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2024-39550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39550"
},
{
"name": "CVE-2022-28615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28615"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2014-10064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-10064"
},
{
"name": "CVE-2024-39511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39511"
},
{
"name": "CVE-2022-23943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23943"
},
{
"name": "CVE-2024-39548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39548"
},
{
"name": "CVE-2020-11993",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11993"
},
{
"name": "CVE-2023-22652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22652"
},
{
"name": "CVE-2024-39528",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39528"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2024-39559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39559"
},
{
"name": "CVE-2014-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7191"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-36049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36049"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2021-41524",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41524"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-39519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39519"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-2700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2700"
},
{
"name": "CVE-2020-7754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
},
{
"name": "CVE-2024-39533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39533"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-26690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
},
{
"name": "CVE-2022-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22719"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-46663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46663"
},
{
"name": "CVE-2011-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
},
{
"name": "CVE-2024-39513",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39513"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2024-39518",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39518"
},
{
"name": "CVE-2023-37450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
},
{
"name": "CVE-2021-30641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-7660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
},
{
"name": "CVE-2022-31813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31813"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2019-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9517"
},
{
"name": "CVE-2018-20834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20834"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2020-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1927"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"name": "CVE-2019-10092",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10092"
},
{
"name": "CVE-2024-39541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39541"
},
{
"name": "CVE-2021-44224",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44224"
},
{
"name": "CVE-2024-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39537"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2019-17567",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
},
{
"name": "CVE-2018-7408",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7408"
},
{
"name": "CVE-2019-20149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-39551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39551"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2022-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29404"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-39565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39565"
},
{
"name": "CVE-2021-31618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31618"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-39549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39549"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2021-33193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
},
{
"name": "CVE-2021-41773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41773"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2022-26377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2020-9490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9490"
},
{
"name": "CVE-2020-28502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28502"
},
{
"name": "CVE-2024-39556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39556"
},
{
"name": "CVE-2022-37436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2023-32439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2022-28330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28330"
},
{
"name": "CVE-2024-39542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39542"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2017-1000048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000048"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2019-10098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10098"
},
{
"name": "CVE-2024-39538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39538"
},
{
"name": "CVE-2022-28614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28614"
}
],
"initial_release_date": "2024-07-12T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0575",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83001",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Inconsistent-information-in-the-TE-database-can-lead-to-an-rpd-crash-CVE-2024-39541"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82976",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-The-802-1X-Authentication-Daemon-crashes-on-running-a-specific-command-CVE-2024-39511"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83027",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83021",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX4600-SRX5000-Series-TCP-packets-with-SYN-FIN-or-SYN-RST-are-transferred-after-enabling-no-syn-check-with-Express-Path-CVE-2024-39561"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83018",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-PIM-packet-causes-rpd-crash-when-PIM-is-configured-along-with-MoFRR-CVE-2024-39558"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82987",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crashes-upon-concurrent-deletion-of-a-routing-instance-and-receipt-of-an-SNMP-request-CVE-2024-39528"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82982",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX240-MX480-MX960-platforms-using-MPC10E-Memory-leak-will-be-observed-when-subscribed-to-a-specific-subscription-on-Junos-Telemetry-Interface-CVE-2024-39518"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83012",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-line-card-Port-flaps-causes-rtlogd-memory-leak-leading-to-Denial-of-Service-CVE-2024-39550"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83019",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-a-specific-TCP-packet-may-result-in-a-system-crash-vmcore-on-dual-RE-systems-with-NSR-enabled-CVE-2024-39559"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83004",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-large-RPKI-RTR-PDU-packet-can-cause-rpd-to-crash-CVE-2024-39543"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83010",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specific-packets-in-the-aftmand-process-will-lead-to-a-memory-leak-CVE-2024-39548"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83014",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-multipath-incremental-calculation-is-resulting-in-an-rpd-crash-CVE-2024-39554"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82996",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Flaps-of-BFD-sessions-with-authentication-cause-a-ppmd-memory-leak-CVE-2024-39536"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82980",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receiving-specific-traffic-on-devices-with-EVPN-VPWS-with-IGMP-snooping-enabled-will-cause-the-rpd-to-crash-CVE-2024-39514"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83000",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-Specific-valid-TCP-traffic-can-cause-a-pfe-crash-CVE-2024-39540"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83008",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Local-low-privilege-user-can-gain-root-permissions-leading-to-privilege-escalation-CVE-2024-39546"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82991",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Protocol-specific-DDoS-configuration-affects-other-protocols-CVE-2024-39531"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83011",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Receipt-of-malformed-BGP-path-attributes-leads-to-a-memory-leak-CVE-2024-39549"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82989",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Attempting-to-access-specific-sensors-on-platforms-not-supporting-these-will-lead-to-a-chassisd-crash-CVE-2024-39530"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82997",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Ports-which-have-been-inadvertently-exposed-can-be-reached-over-the-network-CVE-2024-39537"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83023",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-EX-Series-J-Web-An-unauthenticated-network-based-attacker-can-perform-XPATH-injection-attack-against-a-device-CVE-2024-39565"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83026",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R1-release"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83013",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-MS-MPC-MIC-Receipt-of-specific-packets-in-H-323-ALG-causes-traffic-drop-CVE-2024-39551"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83002",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-CFM-packet-or-specific-transit-traffic-leads-to-FPC-crash-CVE-2024-39542"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83015",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-update-causes-the-session-to-reset-CVE-2024-39555"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83007",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-NFX350-When-VPN-tunnels-parameters-are-not-matching-the-iked-process-will-crash-CVE-2024-39545"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82995",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-specific-traffic-is-received-in-a-VPLS-scenario-evo-pfemand-crashes-CVE-2024-39535"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82993",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4600-Series-Output-firewall-filter-is-not-applied-if-certain-match-criteria-are-used-CVE-2024-39533"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75726",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-UPDATE-causes-RPD-crash-CVE-2024-39552"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82988",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-If-DNS-traceoptions-are-configured-in-a-DGA-or-tunnel-detection-scenario-specific-DNS-traffic-leads-to-a-PFE-crash-CVE-2024-39529"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83017",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-MAC-table-changes-cause-a-memory-leak-CVE-2024-39557"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82983",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Multicast-traffic-is-looped-in-a-multihoming-EVPN-MPLS-scenario-CVE-2024-39519"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83020",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Memory-leak-due-to-RSVP-neighbor-persistent-error-leading-to-kernel-crash-CVE-2024-39560"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82998",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-multicast-traffic-with-a-specific-S-G-is-received-evo-pfemand-crashes-CVE-2024-39538"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82999",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-Continuous-subscriber-logins-will-lead-to-a-memory-leak-and-eventually-an-FPC-crash-CVE-2024-39539"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83016",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Loading-a-malicious-certificate-from-the-CLI-may-result-in-a-stack-based-overflow-CVE-2024-39556"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82992",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Confidential-information-in-logs-can-be-accessed-by-another-user-CVE-2024-39532"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82978",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Execution-of-a-specific-CLI-command-will-cause-a-crash-in-the-AFT-manager-CVE-2024-39513"
}
]
}
CERTFR-2025-AVI-0106
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.x antérieures à 12.0.4 IF2 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.15 | ||
| IBM | Db2 | IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 à 4.8 antérieures à v4.8.8 | ||
| IBM | Security QRadar SIEM | QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP11 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.15",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 \u00e0 4.8 ant\u00e9rieures \u00e0 v4.8.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11",
"product": {
"name": "Security QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2023-51714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51714"
},
{
"name": "CVE-2021-47366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47366"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2024-36361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36361"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2019-9641",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9641"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49352"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2020-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-20703"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2022-48968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48968"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2019-9638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9638"
},
{
"name": "CVE-2022-49016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49016"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2019-9639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9639"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50130"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-31141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2018-20506",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20506"
},
{
"name": "CVE-2018-20346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20346"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2022-49003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49003"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2019-9020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9020"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"name": "CVE-2019-9023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9023"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-41942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41942"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2019-9021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9021"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2019-20478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20478"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2019-16869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2018-20505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20505"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-02-07T00:00:00",
"last_revision_date": "2025-02-07T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0106",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182424",
"url": "https://www.ibm.com/support/pages/node/7182424"
},
{
"published_at": "2025-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182335",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"published_at": "2025-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181898",
"url": "https://www.ibm.com/support/pages/node/7181898"
},
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181480",
"url": "https://www.ibm.com/support/pages/node/7181480"
},
{
"published_at": "2025-02-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182696",
"url": "https://www.ibm.com/support/pages/node/7182696"
}
]
}
cnvd-2017-32971
Vulnerability from cnvd
用户可参考如下厂商提供的安全补丁以修复该漏洞: https://github.com/salesforce/tough-cookie/issues/92
| Name | Joyent Node.js < 2.3.3 |
|---|
{
"bids": {
"bid": {
"bidNumber": "101185"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-15010"
}
},
"description": "Node.js\u662f\u4e00\u4e2a\u57fa\u4e8eChrome V8\u5f15\u64ce\u7684JavaScript\u8fd0\u884c\u73af\u5883\u3002\r\n\r\nNode.js tough-cookie module\u5904\u7406\u4f7f\u7528\u7279\u6b8a\u7684COOKIE HTTP\u8bf7\u6c42\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u5236\u7684\u8bf7\u6c42\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"discovererName": "Cristian-Alexandru Staicu",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://github.com/salesforce/tough-cookie/issues/92",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-32971",
"openTime": "2017-11-07",
"patchDescription": "Node.js\u662f\u4e00\u4e2a\u57fa\u4e8eChrome V8\u5f15\u64ce\u7684JavaScript\u8fd0\u884c\u73af\u5883\u3002\r\n\r\nNode.js tough-cookie module\u5904\u7406\u4f7f\u7528\u7279\u6b8a\u7684COOKIE HTTP\u8bf7\u6c42\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u5236\u7684\u8bf7\u6c42\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Node.js tough-cookie\u6a21\u5757\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Joyent Node.js \u003c 2.3.3"
},
"referenceLink": "https://github.com/salesforce/tough-cookie/issues/92",
"serverity": "\u4e2d",
"submitTime": "2017-10-09",
"title": "Node.js tough-cookie\u6a21\u5757\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
gsd-2017-15010
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2017-15010",
"description": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.",
"id": "GSD-2017-15010",
"references": [
"https://www.suse.com/security/cve/CVE-2017-15010.html",
"https://access.redhat.com/errata/RHSA-2018:1264",
"https://access.redhat.com/errata/RHSA-2018:1263",
"https://access.redhat.com/errata/RHSA-2017:2913",
"https://access.redhat.com/errata/RHSA-2017:2912"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-15010"
],
"details": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.",
"id": "GSD-2017-15010",
"modified": "2023-12-13T01:20:58.564609Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-15010",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2017:2913",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"name": "https://nodesecurity.io/advisories/525",
"refsource": "CONFIRM",
"url": "https://nodesecurity.io/advisories/525"
},
{
"name": "101185",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101185"
},
{
"name": "RHSA-2018:1264",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"name": "RHSA-2017:2912",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"name": "RHSA-2018:1263",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"name": "https://github.com/salesforce/tough-cookie/issues/92",
"refsource": "CONFIRM",
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"name": "https://snyk.io/vuln/npm:tough-cookie:20170905",
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"name": "FEDORA-2019-76f1b57c1c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c=2.3.2",
"affected_versions": "All versions up to 2.3.2",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-400",
"CWE-937"
],
"date": "2019-06-12",
"description": "An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.",
"fixed_versions": [
"2.3.3"
],
"identifier": "CVE-2017-15010",
"identifiers": [
"CVE-2017-15010"
],
"not_impacted": "All versions after 2.3.2",
"package_slug": "npm/tough-cookie",
"pubdate": "2017-10-04",
"solution": "Upgrade to version 2.3.3 or above.",
"title": "Uncontrolled Resource Consumption",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-15010",
"http://www.securityfocus.com/bid/101185",
"https://github.com/salesforce/tough-cookie/issues/92"
],
"uuid": "ee8589b3-792a-496d-84b9-ed8f688d060b"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:salesforce:tough-cookie:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-15010"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/npm:tough-cookie:20170905",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"name": "https://nodesecurity.io/advisories/525",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://nodesecurity.io/advisories/525"
},
{
"name": "https://github.com/salesforce/tough-cookie/issues/92",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"name": "101185",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101185"
},
{
"name": "RHSA-2017:2913",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"name": "RHSA-2017:2912",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"name": "RHSA-2018:1263",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"name": "RHSA-2018:1264",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"name": "FEDORA-2019-76f1b57c1c",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-06-12T17:29Z",
"publishedDate": "2017-10-04T01:29Z"
}
}
}
ghsa-g7q5-pjjr-gqvp
Vulnerability from github
Affected versions of tough-cookie are susceptible to a regular expression denial of service.
The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.
If node was compiled using the -DHTTP_MAX_HEADER_SIZE however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.
Recommendation
Update to version 2.3.3 or later.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "tough-cookie"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.3.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-15010"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:36:20Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "Affected versions of `tough-cookie` are susceptible to a regular expression denial of service.\n\nThe amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.\n\nIf node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.\n\n\n## Recommendation\n\nUpdate to version 2.3.3 or later.",
"id": "GHSA-g7q5-pjjr-gqvp",
"modified": "2021-09-10T20:28:19Z",
"published": "2018-07-24T20:14:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15010"
},
{
"type": "WEB",
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"type": "WEB",
"url": "https://github.com/salesforce/tough-cookie/commit/f1ed420a6a92ea7a5418df6e39e676556bc0c71d"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-g7q5-pjjr-gqvp"
},
{
"type": "PACKAGE",
"url": "https://github.com/salesforce/tough-cookie"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/525"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/101185"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Regular Expression Denial of Service in tough-cookie"
}
fkie_cve-2017-15010
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/101185 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:2912 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:2913 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1263 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1264 | Third Party Advisory | |
| cve@mitre.org | https://github.com/salesforce/tough-cookie/issues/92 | Issue Tracking, Vendor Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/ | ||
| cve@mitre.org | https://nodesecurity.io/advisories/525 | Third Party Advisory | |
| cve@mitre.org | https://snyk.io/vuln/npm:tough-cookie:20170905 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101185 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2912 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2913 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1263 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1264 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/salesforce/tough-cookie/issues/92 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://nodesecurity.io/advisories/525 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/npm:tough-cookie:20170905 | Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| salesforce | tough-cookie | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:salesforce:tough-cookie:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "F06572BE-8433-4322-9E3A-4090793D5371",
"versionEndIncluding": "2.3.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU."
},
{
"lang": "es",
"value": "Se detect\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio con expresiones regulares (ReDoS) en el m\u00f3dulo tough-cookie en versiones anteriores a la 2.3.3 para Node.js. Un atacante que sea capaz de realizar una petici\u00f3n HTTP utilizando una cookie especialmente manipulada podr\u00eda hacer que la aplicaci\u00f3n consuma una cantidad excesiva de recursos de CPU."
}
],
"id": "CVE-2017-15010",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-10-04T01:29:03.403",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101185"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://nodesecurity.io/advisories/525"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101185"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2912"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2913"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1263"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1264"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/salesforce/tough-cookie/issues/92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://nodesecurity.io/advisories/525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/npm:tough-cookie:20170905"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.