SB2012091301 - Multiple vulnerabilities in Apple iTunes
Published: September 13, 2012 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 45 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2012-3702)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
2) Input validation error (CVE-ID: CVE-2012-3703)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
3) Input validation error (CVE-ID: CVE-2012-3704)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
4) Input validation error (CVE-ID: CVE-2012-3705)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
5) Input validation error (CVE-ID: CVE-2012-3706)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
6) Input validation error (CVE-ID: CVE-2012-3707)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
7) Input validation error (CVE-ID: CVE-2012-3708)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
8) Input validation error (CVE-ID: CVE-2012-3709)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
9) Input validation error (CVE-ID: CVE-2012-3710)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
10) Input validation error (CVE-ID: CVE-2012-3711)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
11) Input validation error (CVE-ID: CVE-2012-3712)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
12) Input validation error (CVE-ID: CVE-2012-3657)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
13) Input validation error (CVE-ID: CVE-2012-3658)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
14) Input validation error (CVE-ID: CVE-2012-3659)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
15) Input validation error (CVE-ID: CVE-2012-3660)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
16) Input validation error (CVE-ID: CVE-2012-3671)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
17) Input validation error (CVE-ID: CVE-2012-3672)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
18) Input validation error (CVE-ID: CVE-2012-3673)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
19) Input validation error (CVE-ID: CVE-2012-3675)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
20) Input validation error (CVE-ID: CVE-2012-3676)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
21) Input validation error (CVE-ID: CVE-2012-3677)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
22) Input validation error (CVE-ID: CVE-2012-3684)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
23) Input validation error (CVE-ID: CVE-2012-3685)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
24) Input validation error (CVE-ID: CVE-2012-3688)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
25) Input validation error (CVE-ID: CVE-2012-3692)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
26) Input validation error (CVE-ID: CVE-2012-3699)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
27) Input validation error (CVE-ID: CVE-2012-3700)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
28) Input validation error (CVE-ID: CVE-2012-3601)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
29) Input validation error (CVE-ID: CVE-2012-3602)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
30) Input validation error (CVE-ID: CVE-2012-3612)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
31) Input validation error (CVE-ID: CVE-2012-3613)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
32) Input validation error (CVE-ID: CVE-2012-3614)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
33) Input validation error (CVE-ID: CVE-2012-3616)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
34) Input validation error (CVE-ID: CVE-2012-3617)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
35) Input validation error (CVE-ID: CVE-2012-3622)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
36) Input validation error (CVE-ID: CVE-2012-3623)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
37) Input validation error (CVE-ID: CVE-2012-3624)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
38) Input validation error (CVE-ID: CVE-2012-3643)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
39) Input validation error (CVE-ID: CVE-2012-3647)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
40) Input validation error (CVE-ID: CVE-2012-3648)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
41) Input validation error (CVE-ID: CVE-2012-3649)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
42) Input validation error (CVE-ID: CVE-2012-3651)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
43) Input validation error (CVE-ID: CVE-2012-3652)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
44) Input validation error (CVE-ID: CVE-2012-3654)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
45) Input validation error (CVE-ID: CVE-2012-3598)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
Remediation
Install update from vendor's website.
References
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html
- http://osvdb.org/85385
- http://support.apple.com/kb/HT5485
- http://support.apple.com/kb/HT5502
- http://www.securityfocus.com/bid/55534
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78522
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17433
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://osvdb.org/85386
- http://support.apple.com/kb/HT5503
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78557
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17478
- http://osvdb.org/85387
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78559
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17582
- http://osvdb.org/85388
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78537
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17546
- http://osvdb.org/85389
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78543
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17518
- http://osvdb.org/85390
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78520
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17064
- http://osvdb.org/85391
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78524
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17377
- http://osvdb.org/85392
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78550
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17481
- http://osvdb.org/85393
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78519
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17559
- http://osvdb.org/85394
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78552
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16638
- http://osvdb.org/85395
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78549
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17539
- http://osvdb.org/85416
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78528
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16891
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78544
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17467
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78515
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17562
- http://osvdb.org/85369
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78530
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16780
- http://osvdb.org/85370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78511
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16626
- http://osvdb.org/85371
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78516
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17575
- http://osvdb.org/85372
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78539
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17237
- http://osvdb.org/85373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78551
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17144
- http://osvdb.org/85374
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78525
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17352
- http://osvdb.org/85375
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78554
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17342
- http://osvdb.org/85376
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78517
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17393
- http://osvdb.org/85377
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78542
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17524
- http://osvdb.org/85379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78538
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17384
- http://osvdb.org/85380
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78521
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17463
- http://osvdb.org/85381
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78560
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17288
- http://osvdb.org/85382
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78541
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16986
- http://osvdb.org/85413
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78527
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17336
- http://osvdb.org/85414
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78558
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16532
- http://osvdb.org/85406
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78510
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17437
- http://osvdb.org/85407
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78523
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17224
- http://osvdb.org/85408
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78513
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16983
- http://osvdb.org/85409
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78532
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17199
- http://osvdb.org/85410
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78547
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17184
- http://osvdb.org/85396
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78533
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17357
- http://osvdb.org/85397
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78553
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17507
- http://osvdb.org/85398
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78545
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16588
- http://osvdb.org/85400
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78546
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17530
- http://osvdb.org/85401
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78518
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17516
- http://osvdb.org/85402
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78555
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17246
- http://osvdb.org/85403
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78526
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17272
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78535
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17163
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78512
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17264
- http://osvdb.org/85415
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78548
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17544
- http://osvdb.org/85412
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78534
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17081