Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-2935 (GCVE-0-2008-2935)
Vulnerability from cvelistv5 – Published: 2008-08-01 14:00 – Updated: 2024-08-07 09:21- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:21:34.339Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2008:0649",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"name": "oval:org.mitre.oval:def:10827",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"name": "libxslt-multiple-crypto-bo(44141)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"name": "32453",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32453"
},
{
"name": "31399",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31399"
},
{
"name": "31363",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31363"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"name": "FEDORA-2008-7029",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"name": "20080731 [oCERT-2008-009] libxslt heap overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
},
{
"name": "30467",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30467"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"name": "4078",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/4078"
},
{
"name": "GLSA-200808-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"name": "31310",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31310"
},
{
"name": "MDVSA-2008:160",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"name": "USN-633-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"name": "31331",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31331"
},
{
"name": "20081027 rPSA-2008-0306-1 libxslt",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"name": "20080801 libxslt heap overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"name": "31230",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31230"
},
{
"name": "FEDORA-2008-7062",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
},
{
"name": "ADV-2008-2266",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
},
{
"name": "1020596",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020596"
},
{
"name": "DSA-1624",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"name": "31395",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31395"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2008:0649",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"name": "oval:org.mitre.oval:def:10827",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"name": "libxslt-multiple-crypto-bo(44141)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"name": "32453",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32453"
},
{
"name": "31399",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31399"
},
{
"name": "31363",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31363"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"name": "FEDORA-2008-7029",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"name": "20080731 [oCERT-2008-009] libxslt heap overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
},
{
"name": "30467",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30467"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"name": "4078",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/4078"
},
{
"name": "GLSA-200808-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"name": "31310",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31310"
},
{
"name": "MDVSA-2008:160",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"name": "USN-633-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"name": "31331",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31331"
},
{
"name": "20081027 rPSA-2008-0306-1 libxslt",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"name": "20080801 libxslt heap overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"name": "31230",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31230"
},
{
"name": "FEDORA-2008-7062",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
},
{
"name": "ADV-2008-2266",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
},
{
"name": "1020596",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020596"
},
{
"name": "DSA-1624",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"name": "31395",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31395"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-2935",
"datePublished": "2008-08-01T14:00:00",
"dateReserved": "2008-06-30T00:00:00",
"dateUpdated": "2024-08-07T09:21:34.339Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFCEA36-7573-491B-8438-4E3FDF8E97ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF38997D-634C-423C-BD82-44E74A99D8DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D4401FF-84D8-4AD5-BAED-978E31E5DADB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC004874-3C5D-4932-AD5B-BE7156D7D13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"269892E0-1ABA-4D0F-8266-A4DA8A575967\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4597D362-AD62-4D58-BC7F-CCED44488466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D885D06-D6E5-432C-9923-AE2CE73F7654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F5003EF-82E2-49F9-9F74-CB92FE98E2E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C0D6095-2A7B-4328-ADA0-283E8F79AFDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91C70E5E-A987-4BF3-9300-E4A3F2B0B853\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5EFA6E9-593B-484A-A8FB-A22BAEE208B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58E904DA-889E-44B9-9AF6-EC753FB316BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69A51C1E-21C9-4FA4-8340-345B5E1F1B70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9D7C38F-EF88-4531-803D-BA911978A176\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \\\"an argument in the XSL input.\\\"\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples desbordamientos de b\\u00fafer basados en mont\\u00edculo en las funciones rc4 de (1) cifrado (aka exsltCryptoRc4EncryptFunction) y (2) descifrado (aka exsltCryptoRc4DecryptFunction) en crypto.c en libexslt en libxslt 1.1.8 hasta 1.1.24 permite a atacantes dependientes de contexto ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de un fichero XML que contiene una larga cadena de caracteres como \\\"un argumento en la entrada XSL.\\\"\"}]",
"id": "CVE-2008-2935",
"lastModified": "2024-11-21T00:48:03.040",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-08-01T14:41:00.000",
"references": "[{\"url\": \"http://secunia.com/advisories/31230\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31310\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31331\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31363\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31395\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31399\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/32453\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200808-06.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securityreason.com/securityalert/4078\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1624\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:160\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ocert.org/advisories/ocert-2008-009.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ocert.org/patches/exslt_crypt.patch\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0649.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.scary.beasts.org/security/CESA-2008-003.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/494976/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/495018/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/497829/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/30467\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1020596\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-633-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2266/references\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44141\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31230\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31310\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31331\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31363\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31395\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31399\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200808-06.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/4078\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1624\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:160\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ocert.org/advisories/ocert-2008-009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ocert.org/patches/exslt_crypt.patch\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0649.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.scary.beasts.org/security/CESA-2008-003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/494976/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/495018/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/497829/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/30467\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1020596\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-633-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2266/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44141\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-2935\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-08-01T14:41:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \\\"an argument in the XSL input.\\\"\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer basados en mont\u00edculo en las funciones rc4 de (1) cifrado (aka exsltCryptoRc4EncryptFunction) y (2) descifrado (aka exsltCryptoRc4DecryptFunction) en crypto.c en libexslt en libxslt 1.1.8 hasta 1.1.24 permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero XML que contiene una larga cadena de caracteres como \\\"un argumento en la entrada XSL.\\\"\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFCEA36-7573-491B-8438-4E3FDF8E97ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF38997D-634C-423C-BD82-44E74A99D8DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4401FF-84D8-4AD5-BAED-978E31E5DADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC004874-3C5D-4932-AD5B-BE7156D7D13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"269892E0-1ABA-4D0F-8266-A4DA8A575967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4597D362-AD62-4D58-BC7F-CCED44488466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D885D06-D6E5-432C-9923-AE2CE73F7654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5003EF-82E2-49F9-9F74-CB92FE98E2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0D6095-2A7B-4328-ADA0-283E8F79AFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C70E5E-A987-4BF3-9300-E4A3F2B0B853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EFA6E9-593B-484A-A8FB-A22BAEE208B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E904DA-889E-44B9-9AF6-EC753FB316BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A51C1E-21C9-4FA4-8340-345B5E1F1B70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D7C38F-EF88-4531-803D-BA911978A176\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/31230\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31310\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31331\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31363\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31395\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31399\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32453\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200808-06.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securityreason.com/securityalert/4078\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1624\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:160\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ocert.org/patches/exslt_crypt.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0649.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.scary.beasts.org/security/CESA-2008-003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/494976/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/495018/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/497829/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/30467\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1020596\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-633-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2266/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44141\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31230\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31331\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31363\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31395\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200808-06.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/4078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ocert.org/patches/exslt_crypt.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0649.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.scary.beasts.org/security/CESA-2008-003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/494976/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/495018/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/497829/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1020596\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-633-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2266/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2008-AVI-387
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité présente dans libxslt permet à un utilisateur distant de provoquer un déni de service ou potentiellement d'exécuter du code arbitraire.
Description
Une erreur est présente dans la bibliothèque de fonctions libxslt. La vulnérabilité est relative aux fonctions utilisées pour mettre en œuvre du chiffrement de type RC4 au sein d'un fichier XSLT. Un utilisateur distant malintentionné pourra ainsi provoquer un déni de service ou exécuter du code arbitraire au moyen d'une feuille de style XSLT construite de façon particulière.
Solution
Se référer aux bulletins de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
libxslt versions 1.1.24 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003elibxslt versions 1.1.24 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nUne erreur est pr\u00e9sente dans la biblioth\u00e8que de fonctions libxslt. La\nvuln\u00e9rabilit\u00e9 est relative aux fonctions utilis\u00e9es pour mettre en \u0153uvre\ndu chiffrement de type RC4 au sein d\u0027un fichier XSLT. Un utilisateur\ndistant malintentionn\u00e9 pourra ainsi provoquer un d\u00e9ni de service ou\nex\u00e9cuter du code arbitraire au moyen d\u0027une feuille de style XSLT\nconstruite de fa\u00e7on particuli\u00e8re.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2008:0649 du 31 juillet 2008 :",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0649.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1624 du 31 juillet 2008 :",
"url": "http://www.debian.org/security/dsa-1624"
}
],
"reference": "CERTA-2008-AVI-387",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans libxslt permet \u00e0 un utilisateur distant\nde provoquer un d\u00e9ni de service ou potentiellement d\u0027ex\u00e9cuter du code\narbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9 de libxslt",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1624",
"url": null
}
]
}
CERTA-2008-AVI-387
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité présente dans libxslt permet à un utilisateur distant de provoquer un déni de service ou potentiellement d'exécuter du code arbitraire.
Description
Une erreur est présente dans la bibliothèque de fonctions libxslt. La vulnérabilité est relative aux fonctions utilisées pour mettre en œuvre du chiffrement de type RC4 au sein d'un fichier XSLT. Un utilisateur distant malintentionné pourra ainsi provoquer un déni de service ou exécuter du code arbitraire au moyen d'une feuille de style XSLT construite de façon particulière.
Solution
Se référer aux bulletins de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
libxslt versions 1.1.24 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003elibxslt versions 1.1.24 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nUne erreur est pr\u00e9sente dans la biblioth\u00e8que de fonctions libxslt. La\nvuln\u00e9rabilit\u00e9 est relative aux fonctions utilis\u00e9es pour mettre en \u0153uvre\ndu chiffrement de type RC4 au sein d\u0027un fichier XSLT. Un utilisateur\ndistant malintentionn\u00e9 pourra ainsi provoquer un d\u00e9ni de service ou\nex\u00e9cuter du code arbitraire au moyen d\u0027une feuille de style XSLT\nconstruite de fa\u00e7on particuli\u00e8re.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2008:0649 du 31 juillet 2008 :",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0649.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1624 du 31 juillet 2008 :",
"url": "http://www.debian.org/security/dsa-1624"
}
],
"reference": "CERTA-2008-AVI-387",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans libxslt permet \u00e0 un utilisateur distant\nde provoquer un d\u00e9ni de service ou potentiellement d\u0027ex\u00e9cuter du code\narbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9 de libxslt",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1624",
"url": null
}
]
}
RHSA-2008:0649
Vulnerability from csaf_redhat - Published: 2008-07-31 15:36 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libxslt packages that fix a security issue are now available for\nRed Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "libxslt is a library for transforming XML files into other XML files using\nthe standard XSLT stylesheet transformation mechanism.\n\nA heap buffer overflow flaw was discovered in the RC4 libxslt library\nextension. An attacker could create a malicious XSL file that would cause a\ncrash, or, possibly, execute arbitrary code with the privileges of the\napplication using the libxslt library to perform XSL transformations on\nuntrusted XSL style sheets. (CVE-2008-2935)\n\nRed Hat would like to thank Chris Evans for reporting this vulnerability.\n\nAll libxslt users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0649",
"url": "https://access.redhat.com/errata/RHSA-2008:0649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "455848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=455848"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0649.json"
}
],
"title": "Red Hat Security Advisory: libxslt security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:39+00:00",
"generator": {
"date": "2025-11-21T17:33:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0649",
"initial_release_date": "2008-07-31T15:36:00+00:00",
"revision_history": [
{
"date": "2008-07-31T15:36:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-08-06T10:48:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.src",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.src",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.s390",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.src"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.src"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.src"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Chris Evans",
"oCERT"
]
}
],
"cve": "CVE-2008-2935",
"discovery_date": "2008-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "455848"
}
],
"notes": [
{
"category": "description",
"text": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: buffer overflow in libexslt RC4 encryption/decryption functions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-0:1.1.11-1.el4_7.2.src",
"4AS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.src",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-0:1.1.11-1.el4_7.2.src",
"4ES:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-0:1.1.11-1.el4_7.2.src",
"4WS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-0:1.1.17-2.el5_2.2.src",
"5Server:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2935"
},
{
"category": "external",
"summary": "RHBZ#455848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=455848"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2935"
}
],
"release_date": "2008-07-31T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-31T15:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-0:1.1.11-1.el4_7.2.src",
"4AS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.src",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-0:1.1.11-1.el4_7.2.src",
"4ES:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-0:1.1.11-1.el4_7.2.src",
"4WS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-0:1.1.17-2.el5_2.2.src",
"5Server:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0649"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: buffer overflow in libexslt RC4 encryption/decryption functions"
}
]
}
RHSA-2008_0649
Vulnerability from csaf_redhat - Published: 2008-07-31 15:36 - Updated: 2024-11-22 02:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libxslt packages that fix a security issue are now available for\nRed Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "libxslt is a library for transforming XML files into other XML files using\nthe standard XSLT stylesheet transformation mechanism.\n\nA heap buffer overflow flaw was discovered in the RC4 libxslt library\nextension. An attacker could create a malicious XSL file that would cause a\ncrash, or, possibly, execute arbitrary code with the privileges of the\napplication using the libxslt library to perform XSL transformations on\nuntrusted XSL style sheets. (CVE-2008-2935)\n\nRed Hat would like to thank Chris Evans for reporting this vulnerability.\n\nAll libxslt users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0649",
"url": "https://access.redhat.com/errata/RHSA-2008:0649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "455848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=455848"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0649.json"
}
],
"title": "Red Hat Security Advisory: libxslt security update",
"tracking": {
"current_release_date": "2024-11-22T02:10:27+00:00",
"generator": {
"date": "2024-11-22T02:10:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0649",
"initial_release_date": "2008-07-31T15:36:00+00:00",
"revision_history": [
{
"date": "2008-07-31T15:36:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-08-06T10:48:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:10:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.src",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.src",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"product": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"product_id": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.17-2.el5_2.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.17-2.el5_2.2.s390",
"product": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390",
"product_id": "libxslt-0:1.1.17-2.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.17-2.el5_2.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"product": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"product_id": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.17-2.el5_2.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt@1.1.11-1.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-debuginfo@1.1.11-1.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-devel@1.1.11-1.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"product": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"product_id": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxslt-python@1.1.11-1.el4_7.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.src"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.i386"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.src"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.src"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.src"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.i386"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.ia64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.ppc"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.s390x"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
},
"product_reference": "libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Chris Evans",
"oCERT"
]
}
],
"cve": "CVE-2008-2935",
"discovery_date": "2008-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "455848"
}
],
"notes": [
{
"category": "description",
"text": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: buffer overflow in libexslt RC4 encryption/decryption functions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-0:1.1.11-1.el4_7.2.src",
"4AS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.src",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-0:1.1.11-1.el4_7.2.src",
"4ES:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-0:1.1.11-1.el4_7.2.src",
"4WS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-0:1.1.17-2.el5_2.2.src",
"5Server:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2935"
},
{
"category": "external",
"summary": "RHBZ#455848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=455848"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2935"
}
],
"release_date": "2008-07-31T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-31T15:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-0:1.1.11-1.el4_7.2.src",
"4AS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4AS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.src",
"4Desktop:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4Desktop:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-0:1.1.11-1.el4_7.2.src",
"4ES:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4ES:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-0:1.1.11-1.el4_7.2.src",
"4WS:libxslt-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.ppc64",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-debuginfo-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-devel-0:1.1.11-1.el4_7.2.x86_64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.i386",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ia64",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.ppc",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.s390x",
"4WS:libxslt-python-0:1.1.11-1.el4_7.2.x86_64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client-Workstation:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client-Workstation:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-0:1.1.17-2.el5_2.2.src",
"5Client:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Client:libxslt-python-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-0:1.1.17-2.el5_2.2.src",
"5Server:libxslt-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-debuginfo-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.ppc64",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-devel-0:1.1.17-2.el5_2.2.x86_64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.i386",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ia64",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.ppc",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.s390x",
"5Server:libxslt-python-0:1.1.17-2.el5_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0649"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: buffer overflow in libexslt RC4 encryption/decryption functions"
}
]
}
GSD-2008-2935
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-2935",
"description": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\"",
"id": "GSD-2008-2935",
"references": [
"https://www.suse.com/security/cve/CVE-2008-2935.html",
"https://www.debian.org/security/2008/dsa-1624",
"https://access.redhat.com/errata/RHSA-2008:0649",
"https://linux.oracle.com/cve/CVE-2008-2935.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-2935"
],
"details": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\"",
"id": "GSD-2008-2935",
"modified": "2023-12-13T01:23:01.206675Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-2935",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/31230",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31230"
},
{
"name": "http://secunia.com/advisories/31310",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31310"
},
{
"name": "http://secunia.com/advisories/31331",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31331"
},
{
"name": "http://secunia.com/advisories/31363",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31363"
},
{
"name": "http://secunia.com/advisories/31395",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31395"
},
{
"name": "http://secunia.com/advisories/31399",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31399"
},
{
"name": "http://secunia.com/advisories/32453",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32453"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200808-06.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"name": "http://securityreason.com/securityalert/4078",
"refsource": "MISC",
"url": "http://securityreason.com/securityalert/4078"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306",
"refsource": "MISC",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"name": "http://www.debian.org/security/2008/dsa-1624",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-009.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
},
{
"name": "http://www.ocert.org/patches/exslt_crypt.patch",
"refsource": "MISC",
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0649.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"name": "http://www.scary.beasts.org/security/CESA-2008-003.html",
"refsource": "MISC",
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"name": "http://www.securityfocus.com/archive/1/494976/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/495018/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/497829/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/30467",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/30467"
},
{
"name": "http://www.securitytracker.com/id?1020596",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1020596"
},
{
"name": "http://www.ubuntu.com/usn/usn-633-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"name": "http://www.vupen.com/english/advisories/2008/2266/references",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-2935"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ocert.org/advisories/ocert-2008-009.html",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
},
{
"name": "http://www.ocert.org/patches/exslt_crypt.patch",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"name": "http://www.scary.beasts.org/security/CESA-2008-003.html",
"refsource": "MISC",
"tags": [],
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"name": "30467",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/30467"
},
{
"name": "FEDORA-2008-7029",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"name": "USN-633-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"name": "31310",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31310"
},
{
"name": "GLSA-200808-06",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"name": "31363",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31363"
},
{
"name": "FEDORA-2008-7062",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
},
{
"name": "1020596",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1020596"
},
{
"name": "DSA-1624",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"name": "RHSA-2008:0649",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"name": "31230",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31230"
},
{
"name": "31395",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31395"
},
{
"name": "31331",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31331"
},
{
"name": "31399",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31399"
},
{
"name": "MDVSA-2008:160",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"name": "32453",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32453"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"name": "4078",
"refsource": "SREASON",
"tags": [],
"url": "http://securityreason.com/securityalert/4078"
},
{
"name": "ADV-2008-2266",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
},
{
"name": "libxslt-multiple-crypto-bo(44141)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"name": "oval:org.mitre.oval:def:10827",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"name": "20081027 rPSA-2008-0306-1 libxslt",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"name": "20080801 libxslt heap overflow",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"name": "20080731 [oCERT-2008-009] libxslt heap overflow",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-11T20:45Z",
"publishedDate": "2008-08-01T14:41Z"
}
}
}
FKIE_CVE-2008-2935
Vulnerability from fkie_nvd - Published: 2008-08-01 14:41 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://secunia.com/advisories/31230 | ||
| secalert@redhat.com | http://secunia.com/advisories/31310 | ||
| secalert@redhat.com | http://secunia.com/advisories/31331 | ||
| secalert@redhat.com | http://secunia.com/advisories/31363 | ||
| secalert@redhat.com | http://secunia.com/advisories/31395 | ||
| secalert@redhat.com | http://secunia.com/advisories/31399 | ||
| secalert@redhat.com | http://secunia.com/advisories/32453 | ||
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200808-06.xml | ||
| secalert@redhat.com | http://securityreason.com/securityalert/4078 | ||
| secalert@redhat.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306 | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1624 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:160 | ||
| secalert@redhat.com | http://www.ocert.org/advisories/ocert-2008-009.html | Patch | |
| secalert@redhat.com | http://www.ocert.org/patches/exslt_crypt.patch | Exploit, Patch | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0649.html | ||
| secalert@redhat.com | http://www.scary.beasts.org/security/CESA-2008-003.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/494976/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/495018/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/497829/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/30467 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1020596 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-633-1 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/2266/references | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/44141 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827 | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31230 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31310 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31331 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31363 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31395 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31399 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32453 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200808-06.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/4078 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1624 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:160 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/advisories/ocert-2008-009.html | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/patches/exslt_crypt.patch | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0649.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.scary.beasts.org/security/CESA-2008-003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/494976/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/495018/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/497829/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/30467 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020596 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-633-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2266/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/44141 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html |
| Vendor | Product | Version | |
|---|---|---|---|
| xmlsoft | libxslt | 1.1.8 | |
| xmlsoft | libxslt | 1.1.9 | |
| xmlsoft | libxslt | 1.1.10 | |
| xmlsoft | libxslt | 1.1.11 | |
| xmlsoft | libxslt | 1.1.12 | |
| xmlsoft | libxslt | 1.1.13 | |
| xmlsoft | libxslt | 1.1.14 | |
| xmlsoft | libxslt | 1.1.15 | |
| xmlsoft | libxslt | 1.1.16 | |
| xmlsoft | libxslt | 1.1.17 | |
| xmlsoft | libxslt | 1.1.18 | |
| xmlsoft | libxslt | 1.1.19 | |
| xmlsoft | libxslt | 1.1.20 | |
| xmlsoft | libxslt | 1.1.21 | |
| xmlsoft | libxslt | 1.1.22 | |
| xmlsoft | libxslt | 1.1.23 | |
| xmlsoft | libxslt | 1.1.24 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFCEA36-7573-491B-8438-4E3FDF8E97ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EF38997D-634C-423C-BD82-44E74A99D8DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4401FF-84D8-4AD5-BAED-978E31E5DADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "CC004874-3C5D-4932-AD5B-BE7156D7D13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "269892E0-1ABA-4D0F-8266-A4DA8A575967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4597D362-AD62-4D58-BC7F-CCED44488466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0D885D06-D6E5-432C-9923-AE2CE73F7654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5003EF-82E2-49F9-9F74-CB92FE98E2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0D6095-2A7B-4328-ADA0-283E8F79AFDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "91C70E5E-A987-4BF3-9300-E4A3F2B0B853",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EFA6E9-593B-484A-A8FB-A22BAEE208B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "58E904DA-889E-44B9-9AF6-EC753FB316BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "69A51C1E-21C9-4FA4-8340-345B5E1F1B70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D7C38F-EF88-4531-803D-BA911978A176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\""
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer basados en mont\u00edculo en las funciones rc4 de (1) cifrado (aka exsltCryptoRc4EncryptFunction) y (2) descifrado (aka exsltCryptoRc4DecryptFunction) en crypto.c en libexslt en libxslt 1.1.8 hasta 1.1.24 permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero XML que contiene una larga cadena de caracteres como \"un argumento en la entrada XSL.\""
}
],
"id": "CVE-2008-2935",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-08-01T14:41:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31230"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31310"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31331"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31363"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31395"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31399"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32453"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://securityreason.com/securityalert/4078"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/30467"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1020596"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31230"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31395"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31399"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32453"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/4078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020596"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-4597-8MCF-PW36
Vulnerability from github – Published: 2022-05-01 23:55 – Updated: 2022-05-01 23:55Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."
{
"affected": [],
"aliases": [
"CVE-2008-2935"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-08-01T14:41:00Z",
"severity": "HIGH"
},
"details": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\"",
"id": "GHSA-4597-8mcf-pw36",
"modified": "2022-05-01T23:55:01Z",
"published": "2022-05-01T23:55:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2935"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31230"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31310"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31331"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31363"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31395"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31399"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32453"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
},
{
"type": "WEB",
"url": "http://securityreason.com/securityalert/4078"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1624"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
},
{
"type": "WEB",
"url": "http://www.ocert.org/advisories/ocert-2008-009.html"
},
{
"type": "WEB",
"url": "http://www.ocert.org/patches/exslt_crypt.patch"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
},
{
"type": "WEB",
"url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/30467"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020596"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-633-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2266/references"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.